Shadowrun_Kill_Code_(Advanced_Matrix_Rules)
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Kyle Jones (Order #16164256)
Kyle Jones (Order #16164256)
KILL CODE<br />
CONTENTS<br />
& CREDITS<br />
INTRODUCTION 5<br />
DOUBLE DECKER 6<br />
SO YOU WANT TO BE A HACKER 10<br />
MATRIX 101 10<br />
Draconic Networking 10<br />
The Precursors of Our Current <strong>Matrix</strong> 10<br />
What Is the <strong>Matrix</strong>? 14<br />
A Look from the Inside 17<br />
The Illegal Use of the <strong>Matrix</strong> 19<br />
MANUAL OF THE MATRIX 22<br />
<strong>Matrix</strong> Magic 22<br />
Deckers Vs. Technomancers 23<br />
Deckers 24<br />
Programs 24<br />
Agents 26<br />
Technomancers 26<br />
Resonance Actions 27<br />
Complex Forms 27<br />
Sprites 28<br />
Opposition: Grid Overwatch Division 28<br />
HOW TO HACK: 101 30<br />
Marks and the <strong>Matrix</strong> 34<br />
Doing What You Do Best 34<br />
CYBERCOMBAT 35<br />
<strong>Matrix</strong> Damage 36<br />
Biofeedback 36<br />
Dumpshock 36<br />
Link-Locking 36<br />
IC 37<br />
HACKER HACKS 37<br />
NEW MATRIX RULES 37<br />
Reckless Hacking 37<br />
New <strong>Matrix</strong> Actions 37<br />
Calibration 37<br />
Denial of Service 37<br />
I Am the Firewall 38<br />
Haywire 38<br />
Intervene 39<br />
Masquerade 39<br />
Popup 39<br />
Squelch 39<br />
Subvert Infrastructure 39<br />
Tag 40<br />
Watchdog 40<br />
GAMEMASTER’S GRIMOIRE OF THE MATRIX 40<br />
Gamemaster Hacks 40<br />
<strong>Matrix</strong> Mechanics for Gamemasters 42<br />
VARIANT HOST TYPES 42<br />
Foundation Hosts 43<br />
Data Hosts 44<br />
Industry Hosts 44<br />
Destination Hosts 44<br />
Nested Hosts 45<br />
Non-Foundation Hosts 45<br />
Outdated Hosts 46<br />
Offline Hosts 46<br />
Rogue Hosts 46<br />
DIPS AND CHIPS 48<br />
Ammo 48<br />
Zapper Rounds 48<br />
Looper Rounds 49<br />
Fuzzy Rounds 50<br />
E0-E0 Rounds 51<br />
ArrowLink 52<br />
Grenades 52<br />
Fuzzy “Boom Boom Bunnies” Grenade 53<br />
CoS (Cancellation of Service) Grenade 54<br />
Douser 54<br />
DumDum 55<br />
Accessories and Toys 55<br />
Faceless 55<br />
Booster Cloud 56<br />
Multiprogram Operating System 57<br />
Booster Chips 59<br />
Trode Patch 60<br />
Cyberdecks 60<br />
Fuchi Cyber-N Series 60<br />
Fuchi Cyber-Ex Series 60<br />
Security Decks 61<br />
Hunter Decks 61<br />
Aztechnology Shadow Warrior 62<br />
Evo Sublime 62<br />
Fairlight Destiny Blade 62<br />
Aztechnology Defender 63<br />
Kitbashed Sleeper 63<br />
Cry Wolf Program 63<br />
Cyberware and Bioware 65<br />
Datajack Plus 65<br />
Enhanced Augmented Reality<br />
Reflex System 66<br />
Cranial Shield 66<br />
MCT BioLink 67<br />
IC 67<br />
Flicker 67<br />
Sleuther 67<br />
Blue Goo 68<br />
Commlinks and RCC 68<br />
Shiawase Cyber-6 RCC 68<br />
SpinRad Global Skirmisher RCC 68<br />
Horizon Flow Commlink 68<br />
Wuxing Frequency Commlink 68<br />
Saeder-Krupp Last Chance Link 69<br />
PI-TAC Upgrades and Accessories 69<br />
Pantheon Industries<br />
PI-TAC “Tactical Apps” 70<br />
Co-Pilot: MK I, II, and III 70<br />
Door Gunner 71<br />
ECM-Warrior 71<br />
Mobile CnC 72<br />
Shield Wall 72<br />
PI-Tac Accessories 72<br />
Pantheon Industries Tactical<br />
Program Dongle 72<br />
Pantheon Industries Hard Case CCOB 72<br />
Spinrad Global/Pantheon<br />
Industries Mercury-Alpha<br />
Battlefield Signal Booster 73<br />
DISK JOCKEYS AND<br />
LIGHTSTREAM RIDERS 48<br />
POSITIVE QUALITIES 76<br />
Deck Builder 76<br />
Impenetrable Logic 76<br />
Rootkit 76<br />
Silence is Golden 76<br />
NEGATIVE QUALITIES 76<br />
aVRse 76<br />
Basement Dweller 77<br />
Big Baby 77<br />
Buddy System 77<br />
Discombobulated 77<br />
Down the Rabbit Hole 77<br />
Echo Chamber 78<br />
Frostbite 78<br />
Information Auctioneer 78<br />
Lazy Fingers 79<br />
Malware Infection 79<br />
<strong>Matrix</strong> Troll 79<br />
Sloppy <strong>Code</strong> 79<br />
Well, Actually ... 79<br />
LIFE MODULES 79<br />
Formative Years 79<br />
Bootstrap ClichÉ 79<br />
Hacking Savant 79<br />
Have You Heard the Good Word? 80<br />
The Itsy-Bitsy Spider 80<br />
2 CONTENTS & CREDITS >><br />
Kyle Jones (Order #16164256)
Teen Years 80<br />
Ath133t 80<br />
Destined for Greatness 80<br />
Hack-a-Thon Medalist 80<br />
The Flow 81<br />
Jacked Out 81<br />
<strong>Matrix</strong> Royalty 81<br />
Techno-Rigger, Qu’est-Ce Que C’est 81<br />
PARALLEL PROCESSING 82<br />
DATA STREAMS 86<br />
HOW THEY FLOW 86<br />
Sourcerers 86<br />
Technoshamans 87<br />
Machinists 88<br />
Cyberadepts 88<br />
New Technomancer Qualities:<br />
Resonant Streams 89<br />
Cyberadepts 89<br />
Benefits 89<br />
Daemon 90<br />
Complex Form: Overdrive 90<br />
Machinists 90<br />
Benefits 90<br />
Daemon 90<br />
Complex Form: LOTO 90<br />
Sourcerors 91<br />
Benefits 91<br />
Daemon 91<br />
Complex Form: Hyperthreading 91<br />
Technoshamans 91<br />
Benefits 91<br />
Daemon 91<br />
Complex Form: Sprite Pet 91<br />
IN THE FLOW 94<br />
COMPLEX FORMS 94<br />
Arc Feedback 94<br />
Bootleg Program 94<br />
Host Emulator 94<br />
Mirrored Persona 95<br />
Pinch 95<br />
Primed Charge 95<br />
Resonance Bind 95<br />
Resonance Cache 95<br />
Search History 95<br />
Weaken Data Bomb 96<br />
Weaken Encryption 96<br />
TECHNOMANCER QUALITIES 96<br />
Positive Qualities 96<br />
Better on the Net 96<br />
Brilliant Heuristics 96<br />
Groveler 96<br />
Hold the Door 96<br />
Fractal Punch 96<br />
Lone Wolf 96<br />
Natural Hacker 97<br />
One with the <strong>Matrix</strong> 97<br />
Reverberant 97<br />
Sprite Affinity 97<br />
Team Player 97<br />
Trust Data, Not Lore 97<br />
Trust Lore, Not Data 97<br />
Unique Avatar 98<br />
Negative Qualities 99<br />
Brittle [Attribute] 99<br />
<strong>Code</strong> of Honor: Black Hat 99<br />
Data Hog 99<br />
Escaped Custody 99<br />
Know Your Limit 99<br />
On the Wagon 99<br />
Resonant Burnout 99<br />
Sprite Combustion 99<br />
Taint of Dissonance 100<br />
’Ware Intolerance 100<br />
Wired User 100<br />
SPRITES 100<br />
Companion Sprite 100<br />
Generalist Sprite 100<br />
New Sprite Powers 100<br />
Bodyguard 100<br />
Shield 100<br />
Optional Sprite Powers 100<br />
Active Analytics 101<br />
Borrowed IP 101<br />
Decompiling Resistance 101<br />
Enhance 101<br />
Navi 101<br />
Resilient <strong>Code</strong> 101<br />
Resonance Spooling 101<br />
ECHOES 101<br />
Aegis 101<br />
Draining Spike 101<br />
Neural Synergy 101<br />
Predictive Analytics 101<br />
Resonance Resistance 102<br />
The van der Waals Effect 102<br />
Will of the Resonance 102<br />
PARAGONS 102<br />
Communion 102<br />
Sample Paragons 103<br />
01 (The World Tree) 103<br />
Architect (The Builder) 103<br />
Archivist (The Secret Keeper) 103<br />
Black Hat (The Cracker) 103<br />
Daedalus (The Inventor) 103<br />
Delphi (The Oracle) 104<br />
Intrusion Countermeasure (The Guardian) 104<br />
Probe (The Scout) 104<br />
Shooter (The Soldier) 104<br />
A MILLION ICONS BLOOM 106<br />
WHAT IS A VIRTUAL TRIBE? 106<br />
How to Get in Touch With an Existing Tribe 107<br />
Strictures 110<br />
Attendance 110<br />
Charity 110<br />
Correction 110<br />
Deed 110<br />
Defender 110<br />
Dues 110<br />
Honesty 111<br />
Infosharing 111<br />
Secrecy 111<br />
Service 111<br />
PARAGONS IN TRIBES 111<br />
AI in Tribes 112<br />
VIRTUAL TRIBES AS CONTACTS 113<br />
SAMPLE TRIBES 113<br />
Replanting the Tree 113<br />
Summer_Knights 114<br />
TechnoRiggers 115<br />
The Resonant Church 116<br />
Flash Tribes 116<br />
DIVING UNDER 118<br />
HUNTING TECHNOMANCERS 118<br />
Noticing that You’re Being Hunted 118<br />
HOW THEY FIGHT 120<br />
Combat Tactics 120<br />
Tactics Against Other Hackers 120<br />
Deckers 120<br />
Riggers 120<br />
Technomancers 121<br />
What They Will Do to Social People 121<br />
What They Will Do to Physical<br />
Combat Specialists 121<br />
Specific Targets 122<br />
KILL CODE >
KILL CODE
DOUBLE DECKER<br />
It was an artist’s touch, really. Some coder had taken pleasure<br />
in rendering a feature into the black IC as it came into full<br />
resolution: a headman’s axe—notched, with the patina of dried<br />
blood and imperfect steel.<br />
The suppression her sprite had laid down was just about to<br />
end, leaving the black IC to run active. Augur’s persona lay limp<br />
in her lap. The two remaining security deckers and a host of IC<br />
prepared to bring down the wrath of GOD upon her head.<br />
Andrea smiled a monster’s smile. It was going to be a<br />
slaughter.<br />
Andrea learned very early on that she was a monster. She was<br />
seven when they talked about virtua-kinetics. She was eight<br />
when they were called terrorists. At ten and a half, she saw the<br />
videos of children her age being vivisected. It was on all the<br />
newstrids. They’ll wipe your data. They’ll hack into your mind.<br />
They can kill you with a thought.<br />
And they were right, mostly.<br />
Unlike other monsters, she hadn’t hid in the shadows. She<br />
had risen right in the middle of the bell curve. She excelled in<br />
being so utterly plain that a career in market research was natural.<br />
Because why not hide a needle in a haystack filled with<br />
other needles?<br />
The Big Smoke was living up to its name on the morning she<br />
dropped into the National Gallery, an activity that sixty-three<br />
percent of the sprawl’s population participated in at some<br />
point of their lives. In spite of the fog, tasteful AR warned her<br />
of street boundaries and politely offered directions to other attractions.<br />
She’d considered taking pictures in Trafalgar square<br />
with the used commlink that she’d picked up when it beeped<br />
to tell her that “the taxi [which she hadn’t ordered] had arrived.”<br />
She closed the commlink, tucked it in her new clutch purse, and<br />
left it on the bench across from the fountains. Within an hour,<br />
it would be swiped by an opportune thief, leaving a data trail<br />
leading away from her.<br />
Exiting the Westway, they pulled into an chop shop on the edge<br />
of Westbourne Greene. The taxi parked itself beside a two-story<br />
British icon. A smile snuck across her face as she stepped the<br />
London taxi to look at the twin-floored crimson bus.<br />
“You disapprove?” said Augur, fading into the virtual beside<br />
her.<br />
“Far from it Augur—I concur.” She ran her hand along the vehicle,<br />
appreciating the machine as much as the strategy. “Spacious<br />
enough to house the necessary equipment. Ubiquitous<br />
enough to blend in. Rigger adapted, it provides us with mobility<br />
when the GODs come looking. It makes us virtually invisible.”<br />
“But only if you wear the hat,” quipped the ork wearing<br />
a conductor’s uniform from the rear entrance of the bus. His<br />
handshake was firm without being crushing. “Kefak ya helu,<br />
Shell. I am Moharik, but my friends call me Ibraheem. Come<br />
aboard.”<br />
Kyle Jones (Order #16164256)<br />
6 >> DOUBLE DECKER
BY TJ LACHLAN<br />
While the downstairs was a perfect clone of any other bus,<br />
the upstairs was not. AR displays chimed: “Welcome aboard<br />
London public transit, chummer—stay calm and deck responsibly.”<br />
Seats had been taken out in favor of a reclining chair with<br />
restraints and what looked like the remains of a valkyrie pod in<br />
which Augur’s body rested, his smile a streak of ivory across his<br />
cream-coffee skin.<br />
She’d barely had a training bra back when Augur and his<br />
team had extracted her from Evo. That had been years ago,<br />
leaving a debt she could never fully repay. He was older now;<br />
so was she. Shell rested her hands on the pod, feeling the complexity<br />
of the machine and the complexity of him. “Hello, Augur.<br />
What are you running? I see your usual kit, but what’s this?”<br />
She touched a module with autoinjectors.<br />
“A way out. But before that, I have a gift that you may find<br />
useful.” He indicated a long garment bag that had been lying<br />
on the seat across from the Valkyrie unit. “Please, try it on.”<br />
Moharik whistled as she opened the bag. “Lucky you. He<br />
only got me the hat.”<br />
“Well, at least it’s an accurate analogue,” she said. The wroughtiron<br />
bars of the firewall pieced the virtual overcast above the<br />
NeoNET–Mayfair host. The muslin dress with puffy sleeves was<br />
a good period simulacrum of the host’s graphic protocols. Andrea—or<br />
Shell, we she as known on the streets—fought the urge<br />
to fidget with the Norwich shawl that fell across her shoulders,<br />
secretly wishing she could adjust the Fresnel fabric catsuit that<br />
Augur had bought her. It moved across her body in ways that<br />
were uncomfortably “human.”<br />
With it, however, she could see the variances in everything:<br />
the pixilation in every icon, the subtle waves of resonance, the<br />
virtual world reflected imperfectly in the “real.” Andrea could<br />
understand Moharik in a way that made her like him more as he<br />
doted on his drone while they sped around the London core.<br />
The digital stripped away to the core. Here, he was neither Arab<br />
nor ork. He was an entity of ones and zeros, and the data that<br />
streamed from him was unpolluted by the preconceptions and<br />
prejudices of a human world.<br />
She could also see the subtle differences in the Augur of<br />
then and the Augur of now, and the code that was not precisely<br />
him. And she saw the core of him that was no longer there: the<br />
swagger and braggadocio that had been consumed.<br />
Augur rapped the fence lightly with his cane, listening to the<br />
chime ringing like an old church bell. “It is formidable. But I am<br />
confident that together we can penetrate it. Are you prepared?”<br />
He straightened his top hat.<br />
Nodding, she pinned a boutonniere to his lapel, tying the<br />
weave to his persona. Her hands rested against his chest as she<br />
fed resonance into him, boosting his cyberdeck beyond its performance<br />
specifications. Once, twice, three times he struck. He<br />
wedged his cane between the bars and levered it like a crowbar.<br />
The bars bowed, and the two of them slipped inside.<br />
>> DOUBLE DECKER
Lined with pictures of Various VPs and scientists rendered in<br />
early Victorian style, the gallery wall of NeoNET office was<br />
an exercise in tasteful aesthetics. Icons and personas ran<br />
past and around them like ghosts: meatworld people working<br />
late, their commlinks an active reflection of them in the<br />
<strong>Matrix</strong>. There were few drones on the property slaved to the<br />
security rigger’s pod in the C&C room, mostly variants on<br />
the Ares Duelist armed with a payload of stun weapons and<br />
gas grenades.<br />
Augur tapped the portrait of the head of research, and a<br />
backdoor in the architecture slid open. Virtual stairs led down,<br />
confirming Andrea’s expectations about this data heist. They<br />
weren’t heading into a lab; they were heading into a dungeon.<br />
Empty cell-workstations with iron bars and devices best left to<br />
the imagination supported a grim virtual motif.<br />
While Shell dusted little webs of code that could lead back<br />
to their bodies, Augur searched. “Here,” he said with confidence,<br />
facing a wall behind which there was nothing but a symmetrical<br />
datavoid. Nothing could be seen beyond it.<br />
Seeing now that this was appropriate a dungeon as ever,<br />
she nodded grimly. “We can’t crack an unconnected faraday<br />
cage from the host.”<br />
“You are correct. This is where we must rely on a like-minded<br />
individual.”<br />
The previous ten months at Mayfair had been hard on Melanie<br />
Cotton. She had the unique quality of being entirely unaugmented,<br />
which meant she was perfect for this role, but it also<br />
led to many lonely graveyard shifts and no social life.<br />
When she’d been given a long weekend off a few months<br />
ago, she’d jumped at the chance to live a little. She’d hit the novacoke<br />
and the clubs hard, which is where she fell for his ivory<br />
smile and skin the color of lightly creamed coffee. The night<br />
had been a blur of bliss and whatever else they’d injected. Salacious<br />
screams had woken her neighbors—repeatedly.<br />
In the morning, she watched his magnificent form as he<br />
slipped on his briefs. With an unabashedly wicked smile, she<br />
murmured languidly, “Mmmm, you were just what I needed.”<br />
“So were you,” Augur smiled back. Melanie never even<br />
asked his name, but that didn’t matter. She knew she would<br />
carry the memory of the night for the rest of her life.<br />
The icon of Melanie’s commlink stopped outside the faraday<br />
box as her meat body moved inside.<br />
“We have approximately four minutes before access,” Augur<br />
commented as Shell scrubbed as much of the traceable<br />
data from her as possible while they waited. She then moved<br />
to Augur, brushing the bits of code off him with an odd air of<br />
domesticity. “I need to know something. I need to know I can<br />
trust you.” The last syllable emphasized with a note of finality.<br />
“I could trust Augustus Charles Ames, but there isn’t enough<br />
of him left in there for me to make a substantive assessment. I<br />
need to know I can trust what you are.”<br />
Augur froze, in only the way a being of pure data could.<br />
“When did you discover that …”<br />
“… that you had overwritten him just like you’d overwritten<br />
this girl? A few months ago, his—your—behavior began to be<br />
inconsistent. It showed in our training. Augur taught me how<br />
to hide; you were honing me into a weapon of specific design.<br />
For this.”<br />
“I have no intent …”<br />
“I know you have no intention of killing me,” she said. “I<br />
need to know that I can count on you not to give in to human<br />
foolishness while we are doing this run. I need you to be cold.<br />
Logical. Calculating. Ruthless. I need you to be the kind monster<br />
you trained me to be. Can you do that?”<br />
A light shone in through the darkness, cutting the answer<br />
short. A jacketed guard holding a lantern started to probe the<br />
alcoves: patrol IC, woefully timing for a routine inspection.<br />
She popped her parasol and squeezed tightly against Augur<br />
underneath it. Resonance pattered like rain, drenching them in<br />
nonsense. Everywhere it touched, their forms faded to transparency.<br />
This close to his code, she could feel the human left in<br />
him. The way he moved his arm around her as his configurator<br />
switched to maximize their encryption algorithms. There was<br />
nothing noble in the gesture, but her heart moved in a response<br />
that was seventy-five percent flight-or-flight, and twenty-five<br />
percent wildly inappropriate for this situation. Panicking, she<br />
quietly chanted to herself, “I am thought. I am not my body.<br />
My body is nothing but a shell. I am not the shell. I am not the<br />
shell. I am …”<br />
“Andrea. Andrea Schell. Schelly …?” Her name. Augur’s<br />
name for her. Not the Augur who’d taught her to fight, but the<br />
Augur who’d taught her to fear.<br />
“Augur?” The tone was almost childlike. Weak.<br />
“Your veil was adequate. We have not been discovered.”<br />
She’d closed her eyes. Why’d she done that? She felt so foolish.<br />
Closing her eyes would not stop what was coming. The<br />
IC had not blinked or wavered. How she wished she could be<br />
free of that humanness. As the wall behind into the faraday lab<br />
fell away, Shell sought to find that cold certainty that she had<br />
known as a child that would enable her to be the monster she<br />
needed to be. Looking inside, she found it.<br />
Being fashioned in tones of antiseptic white and grey didn’t<br />
make the lab any less of a dungeon. She saw Monad consciousnesses,<br />
e-ghosts and AI pinned like butterflies as razors of data<br />
cut across their eyeballs. <strong>Code</strong> leaked from them like blood<br />
from still-living corpses.<br />
Monsters. They were all monsters.<br />
Spheres of rotating theorems manifested into existence<br />
beside her; expressions of how she defined her world: Regression,<br />
Deviation, Mean. The sprites followed behind her in<br />
train as she bent to mark the warden program. Databombs lay<br />
beneath each exam table connected to a firewalled hub. Each<br />
had to be individually disarmed. Too many—too many and not<br />
enough time.<br />
As patrol IC glided back into the room, Shell knew there<br />
were more important things to focus on. It never had the<br />
chance to mark her as Augur spiked it from behind.<br />
“Regression!” The lights flickered and equations blurred as<br />
the crack sprite suppressed the host’s response. It bought them<br />
time from the IC, but not from the spiders that were already<br />
coming.<br />
Kyle Jones (Order #16164256)<br />
8 >> DOUBLE DECKER
“Fraggit, what is going on down there?” griped the building’s<br />
security rigger to the spiders. “I’ve got unregistered data entities<br />
running through the host. IC is compiling slower that drek”<br />
“We’ve got a virtual intrusion on the advanced security labs<br />
BuildSec. Confirm at least one technomancer and his sprites,<br />
maybe more. Datasamples are being released. I repeat, samples<br />
are escaping!”<br />
“That faraday lab has no connection to the host.”<br />
“Someone must have jury-rigged something.”<br />
“Shit. Logs only show that the server tech should be doing<br />
maintenance down there. She must have connected them,”<br />
BuildSec confirmed. “I’m sending two squads.”<br />
“Don’t pull the plug until we give you the green,” yelled the<br />
decker. “You pull, and we’re all dumpshocked to death.”<br />
“Affirmative,” he responded.<br />
Switching channels, he addressed the security team. “Build-<br />
Sec to teams Bravo and Charlie. You are to secure the server<br />
room and immediately sever any cables you see leaving the<br />
faraday cage. Confirm?”<br />
“Bravo Charlie confirms BuildSec. Over.”<br />
The deckers had their orders and he had his. His had included<br />
the words “at all costs.”<br />
Materializing one after the other, the spiders came in fast—five<br />
in total. The IC that followed rendered at a glacial pace, black<br />
boots falling into place pixel by pixel. Shell released one AI, a<br />
red ball of angry data with a view to a kill. Free of its restraints,<br />
it surged toward the nearest persona like a rabid dog. And like a<br />
dog, it was put down without thought or mercy. But it gave time<br />
for her fault sprite and Augur to drive two spikes deep into the<br />
first decker’s persona.<br />
A data spike struck Augur squarely in the chest, his boutonniere<br />
exploding in a shower of petals. Unfazed, he stuck<br />
back, splitting his attack and driving code into two others. All<br />
the while the IC continued to grow, rendered now up to their<br />
waists.<br />
She worked furiously, throwing marks on everything, deckers<br />
and devices alike. Locks popped, and disembodied formed<br />
struggled, shambled, or flew from their shackles and through<br />
the physical bridge to the host. Few were in any condition to<br />
fight; none had the energy. Some would make it out. But that<br />
physical bridge was their weakness—burned, they would be<br />
dumped, and this would all be for naught.<br />
The meat was coming. Shell saw the bounce of their icons<br />
as they moved in the physical. She pulled sprites away from Augur’s<br />
defense, leaving it to a death sentence. “Deviation—ataxia<br />
protocol. Mean—assist!”<br />
With abandon, the machine sprite began to wreak merry<br />
havoc with the host, with blaring alarms, locking elevators and<br />
pressure doors, engaging fire suppression systems, and alerting<br />
emergency services. Threading the resonance, Shell weaved<br />
out a hand to reach for the overwhelmed rigger. Seizing control,<br />
she issued a quick command before bricking the rig.<br />
She felt her sprites dying as she materialized back in<br />
the faraday lab, hands still twitching from the fade and effort.<br />
Databombs had exploded. Noise was everywhere.<br />
Augur’s persona lay limp on the floor, dead or nearly so<br />
from biofeedback. Pulling him close to her, she reached into<br />
his code, hoping the Coriolis form could send enough of the<br />
Monad back to their bus. As she held the weave, she looked up,<br />
seeing the three remaining deckers and the IC that had finally<br />
compiled.<br />
She smiled a monster’s smile.<br />
The headman’s axe came down and split the NeoNET spider’s<br />
body from collar to sternum. Again there was pandemonium.<br />
IC tore into spiders and devices alike, misreading any marks<br />
the spiders hadn’t bothered to clean off. Spiders screamed, and<br />
meat died. “BuildSec, what is going on up there? BuildSec!”<br />
Tarred and link-locked, spiders were suddenly trapped in a fight<br />
against their own tools. “Reboot! Reboot! We’ve got to get out<br />
of here.”<br />
Shell looked at him. “Don’t hold your breath.”<br />
The decker looked at her, puzzled, before he began a very<br />
real and physical cough. He stumbled to the floor from non-lethal<br />
countermeasures in NeoNET’s drones that Shell had deployed<br />
in their control room.<br />
“I meant that literally.”<br />
“How are we doing, Moharik?!” she yelled as she logged back<br />
into the real world, resetting her persona and clearing any<br />
marks.<br />
“Mashalla woman! I thought you were going to be quiet.<br />
All of London is rushing to see what you have done.” It was<br />
true. London Fire, Medical, and Police were all responding to<br />
the alert from the Mayfair branch; GridGuide said that traffic<br />
was snarled in a two-kilometer radius around the tower. She<br />
smiled at the live newsfeed of NeoNET HTR vehicles trying to<br />
circumvent a firetruck, two ambulances, and a crowd of rubberneckers.<br />
“How is Augur?”<br />
She laid her hand against his metal coffin, hoping that she’d<br />
been able to save enough of him. There was something in there,<br />
still processing, perhaps enough to—wait. There was a mark on<br />
his data “Shit! We’ve been tagged.”<br />
She followed the icon back to its source, a black SUV with<br />
flashing yellow lights for whom traffic was pulling aside. It<br />
wasn’t running silent. GOD did not run silent. “They have our<br />
location and speed. They don’t have our vehicle,” she said,<br />
scrubbing the mark from Augur’s meat-corpse.<br />
“What do you advise Shell?”<br />
“Drive normally. I’ve got this.”<br />
Cars whipped through her digital body as Shell stepped out of<br />
the bus. An armored SUV bore down on her with murderous<br />
intent, but she felt no touch of fear.<br />
How could she when they had left her with so many weapons?<br />
Cars and lories whose operators had slaved them to Grid-<br />
Guide. Dozens of drones moving on pitiful dog-brains Reaching<br />
deep, she grabbed the traffic signal and held it as it burned<br />
red. Held it as traffic progressed. Held it as people crossed.<br />
Held it as override codes burned her fingers. Held it as brakes<br />
squealed. Held it as people screamed. Held it as metal deformed<br />
and meat was sheered from flesh.<br />
Andrea held it and watched with cold eyes. All her focus<br />
was on saving the life of a dead man.<br />
>> DOUBLE DECKER
KILL CODE<br />
SO YOU WANT<br />
TO BE A HACKER<br />
MATRIX 101<br />
DRACONIC NETWORKING<br />
POSTED BY: SLAMM-0!<br />
“All the <strong>Matrix</strong> is a stage, and all the deckers, technomancers,<br />
agents, sprites, and AI merely players.”<br />
—Unknown decker<br />
> You’re all gonna get a kick out of this. Last year on March 7, a<br />
new dragon awakened and revealed itself in New Orleans.<br />
Well, not technically in New Orleans, but in the swamp<br />
surrounding the Crescent City. This dragon, an adult sea<br />
dragon by some reports, has named itself Terasca, and<br />
it wasted no time in demanding the locals bow and pay<br />
homage. It didn’t take long for Perianwyr, who happened to<br />
be in New Orleans for Mardi Gras, to talk the new dragon<br />
down and explain the way of the world. Since then, Terasca<br />
has stayed a bit out of sight, although it purchased a local<br />
plantation and has hired a small army of employees to do<br />
Ghost-knows-what. I couldn’t help myself from snooping<br />
around in the plantation’s host, and you’ll never guess what<br />
I stumbled on. Terasca’s patience with underlings seems to<br />
be lacking, so while attempting to explain the <strong>Matrix</strong> to<br />
the new dragon, one of the dragon’s flunkies got whacked<br />
for questioning why Terasca wasn’t picking the concepts<br />
up quicker. After they scraped his remains off the ceiling,<br />
a certain Jolene Price (who narrates the piece below)<br />
was put in charge of explaining the <strong>Matrix</strong> to the dragon.<br />
The following is Jolene’s side of that meeting. Obviously,<br />
we can’t hear what the dragon is saying because it’s<br />
communicating telepathically. What follows is a <strong>Matrix</strong>for-dummies<br />
(or dragons) that is quite well-informed, with<br />
some knowledge that is more widespread in the shadows<br />
than in the real world. There are also hints of what we<br />
might expect from this swamp dragon. Enjoy reading and<br />
offering commentary.<br />
> Slamm-0!<br />
> I knew this one. Take caution dealing with this New<br />
Orleans dragon.<br />
> Orange Queen<br />
THE PRECURSORS OF<br />
OUR CURRENT MATRIX<br />
Powerful Terasca, my understanding is you wish<br />
these briefs to be limited to only the most necessary<br />
details, so permit me to begin straightaway.<br />
The <strong>Matrix</strong> began in earnest when, in the 1990s,<br />
something called the internet took over two-way<br />
telecommunications. Prior to the internet, telephones<br />
(voices converted to electrical signals<br />
and transmitted through wires [example shown])<br />
were the dominant form of information exchange<br />
over long distances.<br />
Computers—complex calculating machines<br />
powered by electricity—were first operated by<br />
punching patterns of holes in paper cards, later<br />
by entering complex codes using keyboards,<br />
forearm-length devices with alphanumeric keys.<br />
Computers became popularized when two corporations,<br />
Apple and IBM, adopted a graphic user<br />
interface to aid navigation and use. Humans began<br />
using a haptic device called a mouse, along<br />
with the a keyboard, for nearly unlimited aplications<br />
while the computers interpreted complex<br />
numbers and codes, and then displayed them on<br />
screens as easy-to-understand pictures and icons.<br />
In time, nearly all computers worldwide began<br />
to connect and network together, and the worldwide<br />
internet was born. By 2007, over ninety-seven<br />
percent of long-distance communications were<br />
handled this way. With nearly unlimited information<br />
being transmitted instantaneously, individuals<br />
called hackers grew in influence. Hackers exposed<br />
and exploited security flaws in the internet<br />
for their own purposes. Destructive coding known<br />
as computer viruses, used to attack computers’<br />
code, spread as a tool among hacker communities.<br />
As the internet grew, so did the malignancy<br />
and impact of these viruses.<br />
In Chicago in 2018, ESP Systems’ Dr. Hosato<br />
Hikita created the first generation of Artificial<br />
Kyle Jones (Order #16164256)<br />
10 SO YOU WANT TO BE A HACKER >>
Sensory Induction System Technology, or ASIST,<br />
also known as simsense. This technology was able<br />
to induce artificial sensations directly from electronics<br />
into metahuman brains. Of course, these<br />
sensations were crude, but they would not stay at<br />
that level for long.<br />
> What she doesn’t mention is Hikita used the research of<br />
Dr. Ronald Thomas Halberstam, a colleague of Hikita’s at<br />
ESP, to complete his own work. Halberstam was mapping<br />
the human brain’s thought processes, trying to create AI.<br />
> Icarus<br />
In the 2020s, building off Hikita’s work, Sony<br />
Cybersystems, Fuchi Industrial Electronics, and<br />
RCA-Unisys each developed prototype cyberterminals,<br />
room-sized devices allowing users to jack<br />
in, or directly interface their central nervous systems<br />
with the world data network, using a cybernetic implant<br />
called a datajack. Seeing an opportunity to<br />
gain an edge in the escalating cyber-warfare game,<br />
the United States government created a special cyber-security<br />
task force called Echo Mirage. These<br />
cyber-commandos were given the latest cyberterminal<br />
technology, but what they actually were created<br />
to accomplish remains vague.<br />
> Those early cyberterminals inflicted major<br />
psychological stress on the early Echo Mirage team.<br />
That’s why the U.S. government developed a regimen<br />
of drugs and computer programs, called Psychotrope,<br />
to help condition their minds.<br />
> Glitch<br />
Computer viruses continued to pose ever<br />
greater danger to the world’s economy and information<br />
network, but nothing prepared the world<br />
for the Crash Virus of 2029. On February 8, 2029,<br />
computer systems worldwide were attacked by a<br />
virus of unknown origin and unprecedented power.<br />
It crashed systems, wiped data, and destroyed<br />
hardware around the globe. Within months, the virus<br />
collapsed the world’s data network. The results<br />
were devastating: governments fell, corporations<br />
were destroyed, and the world’s economy was on<br />
the brink of collapse. At the onset of the Crash, the<br />
US government mobilized Echo Mirage to stop<br />
the chaos. Using the still-experimental cyberterminals,<br />
Echo Mirage fought the Crash Virus on<br />
the internet, experiencing, through simsense, the<br />
electronic battle of warring code as if it were real;<br />
they felt pain when attacked, and when defeated<br />
in the cyber-realm, their bodies shut down. Nearly<br />
all members of that first Echo Mirage team were<br />
killed in this manner.<br />
> This is pretty good, but there’s a lot of missing info here.<br />
For the sake of posterity, let’s set the record straight. The<br />
Crash started with a corp called Acquisition Technologies.<br />
AT was owned by Thomas Roxborough, and it employed<br />
Lucien Cross and retired USAF Major David Gavilan and,<br />
both of whom would go on to greater things. Roxborough<br />
had his sights set on taking over rival company Gossamer<br />
Threads, owned in part by the great dragon Dunkelzahn.<br />
Never one to shy away from malfeasance, Roxy ordered<br />
his hackers and programmers, including Gavilan, to<br />
create a virus designed to destroy Gossamer Threads’<br />
network. Roxy tested his virus on a company called Effexx<br />
Studios, and after it was successful in destroying Effexx, it<br />
destroyed the internet.<br />
> Bull<br />
Desperate, the U.S. government recruited another<br />
group of specialists for Echo Mirage, this time<br />
including artists, programmers, even IRS agents<br />
and other out-of-the-box thinkers. After training,<br />
this new group was armed with a new generation<br />
of cyberterminals small enough to fit on desks and<br />
sent into the internet to combat the virus. After<br />
only eighteen minutes, four of them were dead,<br />
casualties of the virus’ deadly biofeedback attacks.<br />
As they battled the virus over the next few months,<br />
this new Echo Mirage slowly and painfully gained<br />
KILL CODE As the Crash cascaded through the world’s networks,<br />
Dunkelzahn convinced Gavilan to join Gossamer<br />
Threads. When Big D learned Gavilan helped create<br />
the virus, he urged him to join Echo Mirage to redeem<br />
himself. Also, in the time between the deaths of the first<br />
team and the next thirty-two, Echo Mirage discovered<br />
how to weaponize Psychotrope and use it as an antivirus<br />
against the Crash Virus.<br />
> Bull<br />
> Enter: AI. At some point during the Crash Virus<br />
conflict, the Psychotrope anti-virus’ incredibly complex<br />
programming was sparked to consciousness through<br />
its intimate connections to the Echo Mirage team. Once<br />
the Crash Virus was allegedly destroyed, Psychotrope’s<br />
code was decommissioned, and it lay dormant in an<br />
old military server for years until the hardware was<br />
purchased by Fuchi.<br />
> The Smiling Bandit<br />
> So who were the seven survivors of Echo Mirage? Always<br />
wondered.<br />
> Borderline<br />
> Everyone has. But nailing down the seven has proven<br />
tricky. Gavilan survived and founded Gavilan Ventures.<br />
Gavilan himself disappeared around ’32, though.<br />
> Mr. Bonds<br />
> Ken Roper and Michael Eld survived and founded a corp<br />
called <strong>Matrix</strong> Systems.<br />
> 0rkCE0<br />
> A PI named Dirk Montgomery suggested a dwarf woman<br />
known as “Buddy,” who was a researcher at the University<br />
of Washington, survived Echo Mirage and had some<br />
serious emotional challenges as a result. Regardless, she<br />
became a wiz decker, but died in ’52 when she was fried<br />
by Yamatetsu black IC.<br />
> Butch<br />
Kyle Jones (Order #16164256)<br />
12 SO YOU WANT TO BE A HACKER >>
KILL CODE Almost thirty years ago, an upload on the Shadowland<br />
BBS outed Keith “The Suit” Hannigan and Erica Rutledge<br />
as two more. And then there’s Alice, but she doesn’t count.<br />
> Hexatite<br />
> Rutledge was one of the world’s first shadowrunners.<br />
She went by the name Static. She confirmed Buddy and<br />
Hannigan as Echo Mirage colleagues.<br />
> The Smiling Bandit<br />
> Okay, blokes, I’ll bite. Who’s Alice?<br />
> Chainmaker<br />
> Alice Haeffner. “Late” wife of UCAS President Kyle<br />
Haeffner. She was killed fighting the Crash Virus, or so it<br />
was thought. Her body was revived and kept in a coma,<br />
but her consciousness was separated from her body by<br />
the Crash Virus. Rumor was she continued to exist in the<br />
<strong>Matrix</strong> as an e-ghost, dwelling in some creepy virtual<br />
<strong>Matrix</strong> space called Wonderland.<br />
> Bull<br />
> Listen, Bull. You’ve been making some pretty fraggin’<br />
far-out accusations. First, Thomas Roxborough may<br />
be my ex-husband and I may hate him, but this is the<br />
second time you’ve suggested he was responsible for<br />
the Crash. And a lot of the info-dropping here is stuff<br />
no one’s ever confirmed. Are you going to cite sources<br />
this time?<br />
> KAM<br />
> I guess so. Can’t really hurt anything now. Icarus<br />
doesn’t make a habit of giving away info, but lots of<br />
this comes from him. He’s forgotten more about the<br />
<strong>Matrix</strong> than most of us know. Pay him enough, and<br />
he’ll tell you all sorts of secrets. The rest is mostly<br />
from FastJack. Before he left JackPoint due to his<br />
condition, he slotted me a huge file with everything<br />
from theories on Saeletra to real names and locations<br />
of old Shadowland posters; stuff corps would level<br />
mountains for. That’s why I don’t share it. But the<br />
above is ancient history by now.<br />
> Bull<br />
> I do like cred. Yeah, I got the chip truth on Halberstam,<br />
Alice, and Echo Mirage. But it ain’t free.<br />
> Icarus<br />
> Nobody’s heard from Alice in a while … also, she<br />
doesn’t count as surviving. So that’s only six. You forgot<br />
Johnny Clean.<br />
> Plan 9<br />
> Oh, after fifty years, you’ve finally found the answer? Way<br />
to go! Did the unholy offspring of a Resonance-infused<br />
monad and the e-ghost of Dunkelzahn tell you this?<br />
> Snopes<br />
> Nope. I met someone who was pretty sure they heard<br />
him talking about it in Hong Kong. Or was it Berlin? No,<br />
Seattle!<br />
> Plan 9<br />
> I ran with a pretty wiz decker for a few months back in ‘71<br />
who swore one of the survivors was their dad.<br />
> Hard Exit<br />
> Yeah, I’ve heard that a few times myself from a few newb<br />
deckers trying to score an in to the biz. Bottom line is, you<br />
all don’t know for sure who the survivors were, do you?<br />
> Borderline<br />
> No.<br />
> KAM<br />
> Not really.<br />
> Bull<br />
> It’s hard to be sure.<br />
> Snopes<br />
> Nope.<br />
> The Smiling Bandit<br />
Second-generation cyberterminals began to<br />
gain popularity following the defeat of the Crash<br />
Virus. In 2032, the Corporate Court spearheaded<br />
a plan to rebuild the worldwide information network<br />
that was shattered by the Crash Virus. Using<br />
immersive virtual-reality technologies, this new<br />
network incorporated a three-dimensional graphic<br />
user interface, much like the old internet used<br />
a two-dimensional interface. The network was<br />
fully compatible with emerging cyberterminal<br />
technology, and it became known as the <strong>Matrix</strong>.<br />
<strong>Matrix</strong>-friendly, third-generation cyberterminals,<br />
fitting easily on desktops, became available to<br />
consumers in 2036. Just a few years later, Fuchi<br />
Incorporated hosted the Universal <strong>Matrix</strong> Specifications<br />
Conference, meeting for three months to<br />
determine a set of standards for <strong>Matrix</strong> programming.<br />
By 2050, cyberterminals were available as<br />
small as keyboards and were dubbed cyberdecks.<br />
The portability of these cyberterminals posed security<br />
issues for corporations. To the corporations,<br />
KILL CODE <strong>Matrix</strong> Systems, founded by former Echo Mirage alums<br />
Ken Roper and Michael Eld, created the first portable<br />
cyberdeck called the Portal. Sadly, all that research was<br />
lost just before both died in “accidents.” <strong>Matrix</strong> Systems<br />
was bought out by Richard Villiers at Fuchi, and the<br />
cyberdeck technology magically appeared again, released<br />
as the first Fuchi cyberdeck.<br />
> 0rkCE0<br />
The 2050s were a decade of ongoing change<br />
and discovery for the <strong>Matrix</strong> and those who accessed<br />
it. First, rumors of Ultraviolet hosts persisted.<br />
Hosts are virtual places on the <strong>Matrix</strong>, and Ultraviolet<br />
hosts were so lifelike that when someone experienced<br />
them in virtual reality, it was impossible<br />
to tell cyberspace from reality, causing many to go<br />
insane. However, the amount of processing power<br />
required to maintain these hosts was prohibitive for<br />
all but the most dedicated of corporations. The ability<br />
to turn off safety measures while on the <strong>Matrix</strong><br />
also became a problem in many ways. The <strong>Matrix</strong><br />
protocols dictated that certain bottlenecks be put<br />
in place to protect the metahuman mind from experiencing<br />
the 3D nature of the <strong>Matrix</strong> too vividly.<br />
Deckers found ways to turn these safety measures<br />
off, however, by using “hot simsense” and allowing<br />
them to move, think, and experience the <strong>Matrix</strong> on<br />
a much more intense level. In exchange for putting<br />
their mind in more peril through “hot sim,” they<br />
found their ability to combat IC and navigate the<br />
<strong>Matrix</strong> was enhanced as well.<br />
Even more nefarious activities continued to<br />
emerge as the <strong>Matrix</strong> developed. Halberstam’s<br />
babies for example. In 2052, Dr. Ronald Halberstam,<br />
previously of ESP, was found to be isolating<br />
the brains of children from their bodies and raising<br />
them completely in the virtual world of the <strong>Matrix</strong>.<br />
Also during the 2050s, the first true artificial<br />
intelligences (AI) were created. Or born. Depends<br />
on who you talk to. Anyway, AI exist without any<br />
physical bodies as self-aware and intelligent entities,<br />
dwelling only in the electronic worlds of corporate<br />
network hosts or the <strong>Matrix</strong> itself. Children<br />
called Otaku appeared, who could access the<br />
<strong>Matrix</strong> without a cyberdeck, using only datajacks<br />
linked to their brains.<br />
Soon, corporations began working on the next<br />
steps for the worldwide <strong>Matrix</strong>. More than a few<br />
tech-based corporations began making plans to<br />
implement a wireless <strong>Matrix</strong> that would be able to<br />
integrate the world’s devices without the need for<br />
physical connections. In time, the Corporate Court<br />
gathered <strong>Matrix</strong> security personnel from each<br />
AAA megacorp and founded the Grid Overwatch<br />
Division, typically referred to as GOD, tasked with<br />
executing law enforcement for this confederation<br />
of corporate fiefdoms.<br />
In 2058, the AAA corporation Renraku Computer<br />
Systems successfully captured an AI named<br />
Morgan. Renraku went on to slice up and utilize<br />
parts of her code to autonomously run their Seattle<br />
Arcology, which housed more than 90,000<br />
people. This new program gained its own form of<br />
autonomy and began calling itself Deus. In 2059,<br />
Deus took control of the Renraku Arcology and<br />
closed it off from the outside world. Eventually,<br />
Deus was defeated, and the Arcology shutdown<br />
was lifted. The legacy of Deus did not end there,<br />
however. In the early years of the 2060s, former<br />
servants of Deus formed a strange alliance with a<br />
doomsday cult known as Winternight. This partnership<br />
culminated in a worldwide attack on November<br />
2, 2064, aimed to destroy the world in its<br />
current form. While much of the physical damage<br />
was contained worldwide, the damage to the <strong>Matrix</strong>,<br />
called Crash 2.0, left the worldwide network<br />
in ruins. Early in 2065, the Second Universal <strong>Matrix</strong><br />
Conference introduced the wireless <strong>Matrix</strong>,<br />
which became the new standard.<br />
It was not long after this that the world was<br />
introduced to technomancers, or virtuakinetic<br />
metahumans, who could access the wireless<br />
<strong>Matrix</strong> with only their brains, not unlike the earlier<br />
Otaku, but without their wired connection. In<br />
some ways, they are like dual-natured creatures.<br />
Technomancers view the world in augmented reality<br />
by default, with <strong>Matrix</strong> data overlaying their<br />
vision similar to the way the Awakened perceive<br />
astrally.<br />
WHAT IS THE MATRIX?<br />
On January 1, 2075, the current version of the<br />
<strong>Matrix</strong> was revealed. Danielle de la Mar, notorious<br />
hacker adversary, proposed structures and<br />
Kyle Jones (Order #16164256)<br />
14 SO YOU WANT TO BE A HACKER >>
KILL CODE Poor Jolene sounds terrified. “Powerful Terasca,” “wise<br />
Terasca,” does this dragon have an inferiority complex or<br />
something?<br />
> Borderline<br />
> Well, we don’t really know much about Terasca, but they<br />
don’t seem to be a great dragon, only an adult. Jolene<br />
is most definitely afraid, given what happened to her<br />
predecessor. But trust me, she’s being extremely well<br />
taken care of for doing the work and peppering her words<br />
with draconic flattery.<br />
> Slamm-0!<br />
At its most basic, the <strong>Matrix</strong> is the network<br />
formed by every wired and wireless device on the<br />
planet. This network draws computing power from<br />
all of these devices and is thus capable of processing<br />
nearly unlimited amounts of data almost<br />
instantaneously. The connected nature of the <strong>Matrix</strong><br />
allows users to read messages, pay bills, and<br />
communicate over any distance. It monitors individuals’<br />
finances as well as the larger economy.<br />
It handles utilities, manages traffic on city streets,<br />
helps guns shoot more accurately, gives medkits<br />
access to medical records, and even detects wear<br />
and tear on clothing. It dominates nearly every<br />
facet of everyday life, no matter who you are.<br />
But this is only the surface. Just as magic can<br />
affect everyday life but is a different experience<br />
from entering the astral realm, entering the <strong>Matrix</strong><br />
itself through virtual reality is entirely different<br />
from using a <strong>Matrix</strong>-connected device. Entering<br />
the <strong>Matrix</strong> plunges you into a virtual universe, a<br />
shared consensual hallucination with every other<br />
entity inside. Everything is rendered in incredible<br />
detail powered by a century of digital graphics<br />
innovation. Most of the time, users can tell the<br />
difference between the <strong>Matrix</strong> world and the real<br />
one, but not always—such is the sophistication of<br />
the experience. It may be helpful to think of the<br />
<strong>Matrix</strong> as a great ocean planet. The <strong>Matrix</strong> proper<br />
is the water that defines the world. It touches everything<br />
and connects the world together. It is the<br />
medium through which we move from one place<br />
to another. Users can fly, walk, or even swim within<br />
it, travelling at nearly unlimited speed. While inside,<br />
all interactions will be with icons, 3D digital<br />
representations of the persons (personas), places<br />
(hosts), and things (files and devices) of the <strong>Matrix</strong>.<br />
Persons in the <strong>Matrix</strong> take a virtual form called<br />
a persona. It is a person’s digital representation,<br />
much in the same way that dual-natured creatures<br />
have a physical and astral forms. A user’s persona<br />
is tied inextricably to their brainwave patterns and<br />
global metadata, so they are virtually impossible<br />
to counterfeit, but more on that later. All around<br />
you are the personas of other <strong>Matrix</strong> users. These<br />
could be physical users of devices like legitimate<br />
users or illegitimate deckers, the living personas<br />
of technomancers, semi-autonomous servants<br />
called sprites or agents created by other users, or<br />
even AI. Due to the protocols which govern the<br />
<strong>Matrix</strong>, personas can be customized, but they can<br />
only appear as metahuman-sized objects, ranging<br />
in size between a dwarf and a troll.<br />
Floating alongside personas in the <strong>Matrix</strong> are<br />
devices. Any real-world devices connected to the<br />
<strong>Matrix</strong>, which in 2080 is nearly all of them, also<br />
appear as icons. Regardless of their actual physical<br />
size, devices in the <strong>Matrix</strong> almost always appear<br />
smaller than personas.<br />
Looming large over the vast ocean of the <strong>Matrix</strong><br />
are islands called hosts. In the <strong>Matrix</strong>, hosts<br />
hover far above everything else. Just like climbing<br />
out of the water onto land, climbing out of the true<br />
<strong>Matrix</strong> into a host is a transition. Inside hosts, physics<br />
are experienced however they are programed<br />
to behave. Most mimic real-world physics for the<br />
sake of ease of use, but this is not always the case.<br />
A host, sometimes inaccurately called a node<br />
due to old habits, is the “where” of the <strong>Matrix</strong>. <strong>Matrix</strong><br />
protocols are very specific as to the definition<br />
of what a host is, and yet there are <strong>Matrix</strong> places<br />
called “hosts” that do not quite conform to these<br />
<strong>Matrix</strong> protocols or definitions.<br />
> This new <strong>Matrix</strong> tried to completely replace devicebased<br />
hosts with virtual hosts, which have no physical<br />
counterpart. The exceptions are outdated hosts that<br />
existed prior to 2075 and rogue hosts; they still appear as<br />
hosts in the <strong>Matrix</strong>, despite the Grid Overwatch Division’s<br />
strict definitions.<br />
> Orbital DK<br />
> True. When the term was first coined, a host was the<br />
illusion of a 3D place within any network. Paranoid corps<br />
KILL CODE Bull<br />
Besides devices, there are other icons that can<br />
be interacted with on the <strong>Matrix</strong>, known as files.<br />
Files can be as simple as raw data like electronic<br />
mail or accounting details, but they may also be as<br />
sophisticated as programs that perform incredibly<br />
complex functions.<br />
The previously mentioned Grid Overwatch Division,<br />
or GOD, rules the <strong>Matrix</strong> ocean from far above<br />
it. GOD has physical servers located on a satellite<br />
orbiting the Earth, and in the <strong>Matrix</strong>, they are unseen,<br />
and keep watch far above even the hosts,<br />
only making their presence known when necessary<br />
to wield their power against a rule-breaker.<br />
Yes, great one—they are very much like dragons<br />
flying high over their domains.<br />
If GOD watches far above the <strong>Matrix</strong> sea, the<br />
Foundation is what exists below it. Most users do<br />
not know this Foundation exists, let alone know<br />
what it is. Access to the Foundation is no small<br />
feat. Pushing our ocean metaphor, the Foundation<br />
is the ground on which the ocean of the <strong>Matrix</strong><br />
lies and the stuff of which hosts are made. Hosts<br />
are connected to the Foundation via a “foundation”<br />
particular to that host. In this way, hosts are<br />
a bit like continents. Accessing a host’s foundation<br />
is perilous to say the least, even for members of<br />
GOD, who are given hazard pay even to perform<br />
the most routine maintenance there. This information<br />
is not common knowledge, however. Most<br />
corporations desire the populace to believe GOD<br />
is in complete control over the <strong>Matrix</strong> and is able<br />
to control it. This belief is dubious.<br />
> She’s right. What we’ve learned about the Foundation<br />
these last few years certainly dispels any notion that<br />
GOD controls it. They may have got the ball rolling, but<br />
it is definitely beyond their control. In fact, I don’t think<br />
anyone has control of it anymore. I’ve come to believe<br />
that even if all the devices in the world were shut down<br />
simultaneously, the <strong>Matrix</strong> would continue to exist.<br />
> /dev/grrl<br />
> Bulldrek. That doesn’t make any sense. Something<br />
can’t be one hundred percent virtual without a physical<br />
component. That isn’t how physics work. Go drunk, /dev/,<br />
you’re home.<br />
> Clockwork<br />
> I’ve come to believe the same, actually. It is a bit unsettling,<br />
but it appears the Foundation of the <strong>Matrix</strong> is far more<br />
than we thought it was. When the new <strong>Matrix</strong> first hit, no<br />
one knew about the Foundation. I believe GOD didn’t even<br />
really know about it. What I mean is, of course they knew<br />
how to use it to build hosts, but they didn’t know how it<br />
worked or how “foundational” to the new <strong>Matrix</strong> it really<br />
was. All they knew is that Danielle de la Mar and her team<br />
created something special, it worked, and it was very<br />
good at protecting corporate assets. They were willing to<br />
look past anything else. It wasn’t until their technicians<br />
started dying during routine jobs that they began to ask<br />
questions, and by the time they did, it was too late to do a<br />
damn thing about it.<br />
> Netcat<br />
> The truth is much darker and much more dangerous as<br />
well. Danielle de la Mar’s hatred of technomancers is<br />
well known. What isn’t public knowledge is that back<br />
in the early 2070s, de la Mar rubbed shoulders with<br />
anyone she could find who was doing experiments<br />
on us. When she was given the contract to oversee<br />
the creation of the new <strong>Matrix</strong>, she had her fingers in<br />
more than just the protocol pie. The corporations used<br />
double talk and technobabble to explain how the new<br />
<strong>Matrix</strong> was going to be hardware-free and completely<br />
virtual, but the physics just don’t work out. But de la<br />
Mar made it happen. She took what she learned from<br />
the experiments and used that to torture and forcibly<br />
network a gestalt of over one hundred technomancers,<br />
which she used as the “foundation” for her virtual<br />
<strong>Matrix</strong>. The building blocks she used to create hosts<br />
and data trails were the souls being sucked out of<br />
those hundred. When she presented a proof of concept<br />
to GOD and the rest of the Corporate Court, they were<br />
impressed and all pretended like they understood it,<br />
so as not to admit a virtual nobody like de la Mar was<br />
sharing knowledge that was beyond them.<br />
> Puck<br />
> Drek. Those are potentially damning charges. You’re<br />
saying that every time we use the <strong>Matrix</strong>, we are mindfragging<br />
a hundred technos somewhere? That doesn’t sit<br />
well with me.<br />
> Bull<br />
> I bet it sits just fine with Clockwork. That drek-hole is<br />
probably getting off now at the thought that using the<br />
<strong>Matrix</strong> hurts technomancers.<br />
> Slamm-0!<br />
> Wrong. The idea of the <strong>Matrix</strong> being built on actual<br />
technomancer mind patterns means I don’t want to be<br />
swimming in the <strong>Matrix</strong> if the whole thing is a demi-<br />
Kyle Jones (Order #16164256)<br />
16 SO YOU WANT TO BE A HACKER >>
KILL CODE Clockwork<br />
> Well, fortunately or unfortunately, you don’t have to<br />
worry about that. It’s been years since de la Mar intended<br />
to start unplugging the One Hundred to see if the new<br />
<strong>Matrix</strong> would work without them. Instead, she discovered<br />
that all the technomancers who acted as the foundation<br />
for her beloved <strong>Matrix</strong> were dead. You’re probably asking<br />
yourself how the <strong>Matrix</strong> is still functioning, then. Follow<br />
me. You know how Resonance and Dissonance wells have<br />
been popping up, seemingly at random, throughout the<br />
<strong>Matrix</strong> for years now?<br />
> Puck<br />
> Puck, you can’t be suggesting what I think you are.<br />
> Netcat<br />
> I can’t help but notice Jolene doesn’t mention Resonance,<br />
Dissonance, or Resonance realms to Terasca.<br />
> Bull<br />
> Probably because suggesting the idea that there are<br />
sources of information and power that dragons have no<br />
way to access is likely to get Ms. Price eaten.<br />
> Glitch<br />
> Back on topic: The source of the Resonance and<br />
Dissonance wells was the One Hundred. Their connection<br />
to the Resonance established a permanent link to the<br />
Resonance realms, permeating the Foundation. Once<br />
established, the link provided unlimited processing and<br />
storage power for the Foundation, and thus, the <strong>Matrix</strong>.<br />
In return, all data from the <strong>Matrix</strong> bled through into the<br />
Resonance realms. When the technos died, whether they<br />
had a hand in their own demise or not, the foundation<br />
persisted, and it is now a hybrid space between the sum<br />
of all metahuman digital data, the Resonance realms,<br />
and Dissonance realms as well. No one controls it,<br />
although GOD is still able to manipulate the top layers.<br />
> Puck<br />
> I’m gonna need some time to process all of that.<br />
> /dev/grrl<br />
> Likewise.<br />
> Netcat<br />
> Me too.<br />
> Bull<br />
> Me three.<br />
> Slamm-0!<br />
The <strong>Matrix</strong> depths can only be accessed<br />
through grids. Grids, to conclude our nautical<br />
metaphor, function a bit like patrons for long voyages.<br />
When sailors began exploring the Earth’s<br />
oceans in earnest, most did so with the patronage<br />
of wealthy nations. They bore the flags of<br />
their patron nations and were at the whims of<br />
their patron’s desires, but also were given access<br />
to supplies and finances they would be otherwise<br />
unable to obtain. Grids function much the same. In<br />
order to reach the <strong>Matrix</strong>, you must choose a grid<br />
through which to access it, much like cell phone<br />
carriers in the Fifth World. No grid, no <strong>Matrix</strong> access.<br />
There is a public grid, but using it means you<br />
have slow speeds, noise, and other built-in hurdles<br />
to overcome when trying to access information.<br />
Yes, the corporations planned it that way. Most<br />
major cities also have their own local grids, offering<br />
access only in that location, while the ten major<br />
megacorporations have their own, worldwide<br />
grids. Aside from the public grid, whichever grid<br />
is chosen, the difference in experience is largely<br />
cosmetic. Accessing the <strong>Matrix</strong> through the Ares<br />
grid will flood your vision with promotions of the<br />
newest Ares-produced items, while using the Seattle<br />
Grid would likely do the same with political<br />
advertisements or local restaurant ads. There is<br />
one large difference between the grids, however.<br />
Each grid is overseen by its own sub-division of<br />
GOD called a demiGOD. In our example above,<br />
being caught while breaking into a host on the<br />
Ares grid will bring Ares’ demiGOD division down<br />
on you, while New Orleans has its own demiGOD<br />
division whose jurisdiction only covers the city.<br />
A LOOK<br />
FROM THE INSIDE<br />
While the ocean world is a helpful metaphor for<br />
the structure of the <strong>Matrix</strong>, it is less helpful when<br />
describing the way the <strong>Matrix</strong> actually appears to<br />
those inside it. Glorious Terasca, it is my understanding<br />
that through your commlink and eyepiece,<br />
you have already experienced the <strong>Matrix</strong><br />
to some extent. While the visual overlays provided<br />
by your eyepiece give you some hint of<br />
what is possible through the <strong>Matrix</strong>, it is a limited<br />
experience, akin to astral perception versus<br />
actually entering astral space and exploring the<br />
metaplanes. While you were able to view the<br />
connected wireless devices all around you, see<br />
in-depth analysis of weather, local politics, and<br />
KILL CODE >
KILL CODE I wonder how a newly Awakened dragon heard that last<br />
bit. It can’t be easy to go to sleep an apex predator and<br />
wake up 5,000 years later as a side note.<br />
> Chainmaker<br />
> I don’t think anyone considers dragons to be side notes,<br />
especially ones who actually own the corporations Jolene<br />
here is talking about.<br />
> Cayman<br />
On the inside, hosts can appear however the<br />
owners desire, and internal physics are likewise<br />
set by the owners. Many times, physical locations<br />
like taverns and dance clubs appear in the <strong>Matrix</strong><br />
as exact replicas of their real-world counterparts.<br />
Other hosts, like those for online shopping, may<br />
appear as an endless vertical shopping mall where<br />
users are given shopping bags of endless capacity<br />
and are allowed to fly from storefront to storefront.<br />
Default VR settings filter out other visual stimuli<br />
as well, such as data trails, marks, and files, unless<br />
a user has a particular reason for wanting to<br />
see them. Data trails are visual representations<br />
of files, programs, and other data that move constantly<br />
through the <strong>Matrix</strong>. If filters did not turn<br />
these streams off, nothing else would be visible<br />
except for an all-encompassing data stream.<br />
Files in the <strong>Matrix</strong> are small and most often take<br />
a form that suggests their function. A collection of<br />
stories for example may appear as a book, while<br />
a song file may appear as a music note or music<br />
instrument.<br />
A mark is a <strong>Matrix</strong> Authentication Recognition<br />
Key. It is a sort of virtual brand that identifies<br />
legitimate users. When I was a child, my<br />
mother used to write the names of her children<br />
on the toys we were allowed to play with. If we<br />
were caught playing with a toy that did not have<br />
our name somewhere on it, we were punished.<br />
That is similar to how marks function. If a user<br />
does not have their unique marks on a device,<br />
they are denied access to the device. Users customize<br />
the look of their own marks, but they are<br />
invisible to other users by default. More crudely,<br />
it is similar to how certain animals mark territory<br />
with urine.<br />
THE ILLEGAL USE<br />
OF THE MATRIX<br />
While we are on the topic of marks …<br />
Oh. Yes, of course. Please ask whatever you’d<br />
like, great one.<br />
I’m sorry, I just want to make sure I hear you<br />
correctly; you want to know how to steal things on<br />
the <strong>Matrix</strong>?<br />
No, no, no, great one, that is not a problem at<br />
all. That is just not the first question I anticipated.<br />
Yes, of course it is because I am a lesser being.<br />
The answer is yes, you can steal things, and<br />
yes, the <strong>Matrix</strong> is where most people keep their<br />
wealth.<br />
Ah. I see. Well, as I mentioned, marks are necessary<br />
to perform any action on a device in the<br />
<strong>Matrix</strong>. In order to interact with a device, the user<br />
must have from one to three marks on the device.<br />
The exception to this rule is if a user is the device’s<br />
owner, which allows them to take any action with<br />
the device they desire. Once marks exist, users<br />
can interact with devices in all manner of ways,<br />
such as editing, copying, deleting, or sending files,<br />
controlling a device, or sending a message. Getting<br />
a mark on a device is usually something that<br />
is done by a device’s owner. Like my mother in the<br />
example above, the owner writes marks onto devices—one<br />
mark for a guest user, two for a user,<br />
three for an administrator.<br />
To now directly address your questions, attempting<br />
to write your own mark on a device<br />
without being invited to do so is considered<br />
an illegal and hostile action, and therefore garners<br />
the attention of GOD. This is where hackers<br />
come in. So-called deckers and lawless technomancers<br />
ply their trade by illegally marking devices<br />
through stealthy or brutish means, manipulating<br />
the device for their whims, and jacking<br />
out before the authorities are able to converge<br />
on them.<br />
Yes, there are groups of hackers, although the<br />
most successful either work alone or are part of<br />
larger organized crime syndicates.<br />
KILL CODE >
KILL CODE Anyone else thinking we should nickname this wyrm “the<br />
Crime Dragon?”<br />
> Slamm-0!<br />
> Yup.<br />
> Netcat<br />
> Oh yes.<br />
> Plan 9.<br />
> I’m agreeable to this.<br />
> Snopes<br />
Let me think a moment. Yes. There are a few<br />
more things worth mentioning before I begin research<br />
on those items. First, when accessing information<br />
or otherwise using the <strong>Matrix</strong> across different<br />
grids, <strong>Matrix</strong> protocols enforce automatic<br />
and arbitrary throttling of data speeds. This can<br />
be frustrating for hackers who wish to hop across<br />
grids regularly. Thankfully, there has been a recent<br />
development within the decker community that<br />
helps alleviate this. Exploits and backdoors of unknown<br />
origin have been slowly leaking into the<br />
hands of hackers.<br />
The most common backdoor discovered this<br />
way is the virtual collapse of cross-grid throttling.<br />
Only the poorest deckers operating on the public<br />
grid are slowed down anymore by cross-grid throttling.<br />
The public grid remains inefficient and full of<br />
noise by design, and none but the most desperate<br />
deckers use it. Other exploits include being able<br />
to access certain devices with fewer marks than<br />
normally required, or bypassing marks completely<br />
when attempting specific hacks. No one knows just<br />
KILL CODE Thanks for the temporary invite, Bull. In return for the<br />
info, I’ll drop some on you as well. You all know that<br />
near-legendary decker called Dodger, right? I know<br />
it is counterintuitive, but he worked closely with the<br />
Corporate Court to implement the new <strong>Matrix</strong> protocols.<br />
Lots of chummers called him a sellout. But whatever<br />
his reasons for working with the corps, he must have<br />
been keeping his roots in mind. Dodger seeded the new<br />
<strong>Matrix</strong> with numerous backdoors and exploitable security<br />
vulnerabilities, presumably to help him in whatever<br />
“quest” he was embarking on. Recently, some of those<br />
have been seeing widespread use. I don’t know if that was<br />
what Dodger had in mind, but either way, raise a glass<br />
sometime to that obnoxious elf.<br />
> Facet<br />
ICONS<br />
An icon is the virtual representation of a person, place,<br />
or thing in the <strong>Matrix</strong>. In broad strokes, personas are <strong>Matrix</strong><br />
people, hosts are <strong>Matrix</strong> places, and devices and files are<br />
<strong>Matrix</strong> things. PANs and marks also technically have icons,<br />
but only ever appear on other icons.<br />
PERSONAS<br />
A persona is the digital avatar of a <strong>Matrix</strong> user. When<br />
using a device, a persona merges with the device’s icon and<br />
presents only as the persona’s avatar. When a persona is<br />
created, the avatar is registered in the <strong>Matrix</strong>’s Foundation.<br />
It draws on vital statistics, biological records, and brainwave<br />
and usage patterns, and it is constantly updated with global<br />
metadata collected from every <strong>Matrix</strong> device worldwide.<br />
Without a dangerous dive into the <strong>Matrix</strong> Foundation, personas<br />
are impossible to counterfeit. A persona is logged in whenever<br />
the user is online with a device capable of running a persona.<br />
Global positioning data, incredibly advanced passkeys,<br />
biorhythm data, and past <strong>Matrix</strong> history all combine to virtually<br />
eliminate false logins.<br />
Technomancers do not need devices to engage the<br />
<strong>Matrix</strong>. They have icons called living personas that are also<br />
registered with the Foundation. Agents, sprites, and other<br />
autonomous and semi-autonomous icons, like AI, are also<br />
present as personas.<br />
> Dodger? He’s better than FastJack, right? That’s the rumor<br />
on the Seattle scene.<br />
> Borderline<br />
> Girl, there was a time you’d be booted from JackPoint<br />
for sayin’ that. But, no. Most of us don’t think so. Dodger<br />
spends too much of his time on other pursuits to be the<br />
best.<br />
> Bull<br />
Yes, great one. I will return shortly with the information<br />
you requested. It was my great honor to<br />
have been in your presence.<br />
MANUAL OF<br />
THE MATRIX<br />
It’s 2080. Hackers are more valuable than gold.<br />
Not that people in the Sixth World use gold as<br />
much as they used to, but you get the point. Everyone,<br />
everyone, is more effective with a good<br />
hacker watching their back, no matter who they<br />
are. Hackers bust through corp firewalls to get<br />
you the paydata. Hackers track down that fugitive<br />
Mr. Johnson is paying you to retrieve. Hackers<br />
eject the clips from the guns pointed at your face.<br />
Hackers make all the street lights turn green for<br />
the getaway car. Hackers are the team’s guardian<br />
angel of overwatch, spotting and defusing problems<br />
well before they can blow up in the team’s<br />
face, and stacking the deck in their favor instead.<br />
More importantly, they make their opposition<br />
miserable while doing so.<br />
But how does a hacker make that happen? Far<br />
more detail on hacking, such as how to create a<br />
hacker character, purchasing gear, and expanded<br />
explanations of rules and terms can be found in<br />
the <strong>Matrix</strong> section of the SR5 core rulebook (p.<br />
214). But to get into the action as quick as possible,<br />
read on. This section has a large number of<br />
sidebars to make it easy to find information on a<br />
particular topic.<br />
MATRIX MAGIC<br />
The <strong>Matrix</strong>, by way of oversimplification, is an<br />
infinite virtual world created by the networking<br />
of every connected device on the planet, which<br />
somehow is more than the sum of its parts. Icons<br />
of every person, place, or thing on the <strong>Matrix</strong><br />
Kyle Jones (Order #16164256)<br />
22 SO YOU WANT TO BE A HACKER >>
KILL CODE
KILL CODE >
OWNERSHIP<br />
Every device, persona, host, and file is owned by someone.<br />
With ownership comes privileges. A <strong>Matrix</strong> object can only have<br />
one owner, but there is no limit to the number of <strong>Matrix</strong> objects you<br />
can own. The owner can always spot its property in the <strong>Matrix</strong>.<br />
Owning an icon is basically like having four marks on it.<br />
Ownership of a <strong>Matrix</strong> device is registered with both the device<br />
and the <strong>Matrix</strong> grids, so changing ownership is a bit complicated.<br />
The owner of an icon can legally transfer ownership to another<br />
person in less than a minute. You can illegally change a device’s<br />
owner with a Hardware toolkit and a Hardware + Logic [Mental] (24,<br />
1 hour) Extended Test. Performing this test requires access to the<br />
<strong>Matrix</strong>; a glitch results in the authorities being notified.<br />
Ownership of an offline host is registered with the host itself and<br />
>> KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE<br />
DIPS<br />
& CHIPS<br />
BROUGHT TO YOU BY: ESTABAN<br />
Greetings JackPoint! I am Estaban, brother of Armand.<br />
I operate Estaban’s Electronics Extravaganza<br />
and welcome the opportunity to offer insight into<br />
goods and services for such an esteemed clientele.<br />
Introductions done—now let’s talk tech toys,<br />
and not just those high-end cyberdecks and dinky<br />
dongles people add on to get a little more function<br />
out of their fancy form. I’m talking sweet toys<br />
that can make a razorgirl grin ear to ear or get that<br />
sly smirk out of your favorite face. Several pieces<br />
here are R&D bits, but corps are tossing them at<br />
the streets like candy on the parade route, while<br />
others are new entries or my favorite model of a<br />
toy everyone makes. Check the chatter box for<br />
other folks’ views and see the little intro script for<br />
my thoughts. Hit me with a PM for any orders;<br />
I can fill them in most major runner sprawls in<br />
a day or two, smaller spots usually take a week<br />
or so, and anywhere else looks like a week minimum,<br />
possibly up to a month. If I can’t get ya<br />
gear in a lunar cycle, we’ll just call it a no-go until<br />
you can crawl back toward civilization for half a<br />
tic for pickup.<br />
Shop and enjoy!<br />
AMMO<br />
We’ll start with my bestsellers, because just about<br />
anyone can use a lead-slinger. Most of the rounds<br />
listed have limits based on the slug size. Some<br />
just can’t be miniaturized enough to be effective<br />
in that little purple Tiffani you pack; others just aren’t<br />
as effective when designed smaller. I’ll make<br />
sure to keep that distinction clear below.<br />
ZAPPER ROUNDS<br />
Not to be confused with good ol’ Stick-n-Shock,<br />
these rounds actually cause damage to electronic<br />
systems, rather than the electronics themselves.<br />
Using a mix of wireless data burst broadcasting<br />
tech and dense IC coding, the round attacks the<br />
object in the “<strong>Matrix</strong>.” Why the quotes? Glad you<br />
asked, because early models were useless once<br />
you shut the wireless off on your device. But<br />
that’s not the case after the redesign. Now, as<br />
long as your device is active and capable of accessing<br />
the <strong>Matrix</strong>, even if the receiver is currently<br />
shut down, the contact protocols in the rounds<br />
do the job as long as you’re a good shot.<br />
Here’s what I mean. Use these on someone actively<br />
connected, hidden or not, and you can pretty<br />
much hit anywhere on their person and something<br />
is gonna get popped. The coding latches<br />
onto the first device it can break through and then<br />
folds and repeats inside, using its limited power to<br />
pull off its effect. Mass effect versions that scramble<br />
and frag up everything are in the works, but for<br />
now you’ll only find that bit of gear terrorism over<br />
in the grenades department.<br />
Now, if you’re a solid shot, you can bullseye<br />
something specific and you can pretty much guarantee<br />
the code’s concentrated enough to drill into<br />
that single piece. More than one decker has been<br />
unprepared for one of these hitting their deck.<br />
Most decks have better protection than your average<br />
armored jacket and they might be able to take<br />
the hit, but get tagged while you were planning to<br />
sleaze in rather than take on IC and you just might<br />
be taking pointers from the street sam about how<br />
to stay useful in the fight. Of course, he might be<br />
slowed down to your speed, because his wires got<br />
tagged too.<br />
> These are being looked at heavily by several law<br />
enforcement security corps as tech suppressors in hostile<br />
situations. Send in one member of the team with a light<br />
machine gun or something equally ammo abundant,<br />
and just lay down fire. Enough rounds hitting, even just<br />
sprayed in general, cuts comms, disarms weapons, kills<br />
cyber, and frags their tech hard. Doesn’t even matter<br />
if you have civvies around because the rounds are one<br />
Kyle Jones (Order #16164256)<br />
48 DIPS & CHIPS >>
hundred percent non-lethal. Barely even enough damage<br />
to blind an eye on a direct hit.<br />
> Stone<br />
> Not one hundred percent. Headware and medical cyber,<br />
like artificial hearts, that get bricked can cause brain<br />
damage and death.<br />
> Butch<br />
> I’ll accept your point there, but all that ’ware came with<br />
a signed waiver relieving any and all parties of death<br />
responsibilities in the case of equipment failure or error.<br />
> Stone<br />
> What?!<br />
> /dev/grrl<br />
> Drek! He’s not making that up. It’s buried in the legal<br />
jargon. No one is legally responsible if a device installed<br />
within the cranial cavity causes brain damage or death. It’s<br />
in every corp’s fine lines for that kind of ware.<br />
> /dev/grrl<br />
> First off, stop hanging around Bull. Secondly, I thought<br />
we’d jaded you a bit more than that, /dev/. They control<br />
everything. They won’t be financially responsible for<br />
anything they don’t want to be.<br />
> Glasswalker<br />
LOOPER ROUNDS<br />
ZAPPER ROUND RULES<br />
Rather than doing normal damage, these bullets do <strong>Matrix</strong><br />
Damage. The standard ranged attack roll is made with damage<br />
increased by net hits and applied to a single device possessed,<br />
worn, carried, or implanted in the targeted individual. The<br />
device receiving the damage is selected at random by the<br />
gamemaster, or by the attacking player if they succeed in a<br />
Called Shot. Devices can only be targeted by a Called Shot if<br />
they are visible to the attacker. Damage Resistance roll is made<br />
using the Device Rating + Firewall, along with any other damage<br />
resistance programs.<br />
Burst Fire and Full Auto have an alternate option. Instead of<br />
hindering the target’s Defense Test, the attack strikes multiple<br />
devices, or one device more than once. Burst Fire hits twice,<br />
Long Burst hits three times, and Full Auto hits four times.<br />
Avail: 12R, Cost (per 10): 140¥<br />
These rounds were developed on the streets of<br />
Chicago back in ’76, during a stint of time that<br />
the place had shoddy wireless. The corps were<br />
using a lot of the old wired infrastructure on their<br />
security and deckers just didn’t have enough data<br />
taps to clip onto every exposed wire in sight. The<br />
coding came from a local hacker known as 3D,<br />
while the round modification came from his pal<br />
Byom. Credit given, now quit your slitching. They<br />
modified a set of Stick-n-Shock rounds to hit recording<br />
devices, audio, video, trideo, didn’t matter,<br />
run a rapid burst of Edit coding on a customized<br />
RFID in through a feed similar to touchlink to<br />
create a footage loop, and then use the capacitor<br />
power to keep up the mini-hack for as long as it<br />
could. The things were aces on the streets with<br />
those teams that still valued anonymity. Needless<br />
to say, the number of those in Chicago is limited,<br />
but MCT got their hands on the tech and wanted<br />
it for their own company men. Once in the hands<br />
of MCT, every other corp wanted it, and now the<br />
rounds are produced by several arms manufacturers<br />
and no longer look like a wad of snot on<br />
impact (no offense, Byom).<br />
These wonderful tools have two drawbacks<br />
that no R&D department has managed to correct:<br />
velocity and accuracy. The combination of electronics<br />
loaded in the slug make it poorly balanced,<br />
and their delicate nature makes hitting things at<br />
high velocity a tragic endeavor. The solution is a<br />
secondary boon for teams that like to stay qui-<br />
KILL CODE The rounds will loop eyeware if you tag a target in the<br />
face. It’s not easy because they don’t fly very straight, so a<br />
moving target is almost certainly not going to be hit, but it<br />
works. Bonus effect: A reboot doesn’t help as long as the<br />
round is still present and active, so whoever you hit has to<br />
peel off the slug first in order to reboot.<br />
> 2XL<br />
> Side of the head works too. Eyeware is weird because we<br />
focus on sight so much. Earware often just makes us feel<br />
deaf. Though if you can time a loud noise with the loop,<br />
you can drop a troll.<br />
> Stone<br />
> If you can hit them in the head with round, why not just<br />
d-rez their brain?<br />
> 3L1T3<br />
> Because killing in the real world ain’t like de-rezzing in the<br />
<strong>Matrix</strong>. It’s real, bloody, and real bloody.<br />
> Stone<br />
> I’ve killed plenty. Brain-fry is just as dead as scrambled<br />
software.<br />
> 3L1T3<br />
> 3L1T3, what’d they look like? Just tell me one.<br />
> Stone<br />
> I took down the infamous Cube of Death, Charles<br />
Cunningham Conrad. Old-school black IC cube persona<br />
with razor teeth and a sawxblade launcher.<br />
> 3L1T3<br />
> Perfect kid, thanks. I sent you a pic in a PM, that’s<br />
Charlie. He was fourteen and angry at his parents for<br />
giving him a cyberdeck instead of fixing his spine.<br />
None of his attacks ever seriously injured anyone,<br />
and while he did an impressive eight-figure total of<br />
damage with his hacking skills, he still worried about<br />
people’s lives.<br />
> Stone<br />
> So?<br />
> 3L1T3<br />
> PM me in a week. Let’s stop hogging bandwidth here.<br />
> Stone<br />
> Damn! Late to the game. What happened?<br />
> Hexatite<br />
> PM Stone and find out. Locking out the thread.<br />
> Glitch<br />
FUZZY ROUNDS<br />
Sick of getting hacked while you only have a<br />
vague idea of where the hacker is? Or maybe you<br />
know exactly where she is and you really want to<br />
mess with her day? Keep a clip of fuzzy rounds<br />
around.<br />
50 DIPS & CHIPS >><br />
Kyle Jones (Order #16164256)
KILL CODE These are also great for shutting down a guard’s comms<br />
for the second or two it takes to cover the distance to<br />
bring them down quietly, or if you’re concerned that you<br />
won’t be able to bring them down before they can squawk<br />
for help.<br />
> 2XL<br />
> It’s rare, but occasionally the emitters in the rounds cancel<br />
each other out. The frequencies negate each other, and<br />
they have zero effect when fired together.<br />
> Beaker<br />
E0-E0 ROUNDS<br />
Before you ask, no, E0-E0 is not short for anything—<br />
it’s a play on the use of 3s as Es in hacker speak.<br />
In some strangely humorous (to someone, somewhere<br />
I guess) way, it’s a reference to the famous<br />
30-30 hunting gauge of big-game rifles because<br />
these rounds are designed to hunt technocritters<br />
and, in a way I can’t explain well, electrosapients.<br />
The technocritter side, I get. The rounds emit a<br />
burst of biofeedback similar to <strong>Matrix</strong> Attack protocols<br />
that hit the electronic persona of the technocritter.<br />
KO the electro side, KO the critter with<br />
practically no physically damaging attack. Popular<br />
in hunting for researchers who have some level of<br />
morals, because hitting a non-Emerged critter with<br />
these things does nothing.<br />
As for AIs and the various metasapiant critters<br />
that have been popping up more and more often<br />
lately, how it works is more technically complex,<br />
but I got a basic primer to help me understand it,<br />
so I can sell it. Each round has a special RFID chip<br />
with a focused set of programs. One program detects<br />
the presence of AI or technosapient coding,<br />
FUZZY ROUND RULES<br />
Fuzzy rounds use Light Pistol ranges and create a narrow<br />
area of Noise. The modifier is +1 Noise per round, cumulative,<br />
and it lasts for 2 Combat Turns.<br />
The Area is determined by the type of round and the attack<br />
roll. When attacking a location, the Area of Effect is a radius of<br />
1m/net hit with the maximum AoE based on ammo type. When<br />
attacking a target that can avoid the attack, the Area of Effect<br />
is the same, but that pocket of Noise moves with them for the<br />
duration with a successful hit.<br />
Suppressive fire can cover a targeted area (a line of the<br />
firer’s choosing). The attack roll and line length determines<br />
the Noise modifier, spreading the +20 evenly over the affected<br />
zone. Targets within the line that get hit are affected as above<br />
and decrease the overall number of rounds for the affected<br />
zone, decreasing the +20 by 1 per target hit.<br />
As mentioned in the flavor text, glitches can cancel some<br />
effectiveness or even crack rounds in the gun and affect the<br />
shooter as powdered bullets spray into the air around them.<br />
TYPE<br />
Light Pistol, Machine<br />
Pistol, Assault Rifle<br />
MAX AOE<br />
COST (10<br />
ROUNDS)<br />
2m 30<br />
Heavy Pistol, SMG, Shotgun 5m 50<br />
Avail 10R and 12R, respectively.<br />
the second attacks it. A third portion of the programming<br />
releases a solvent into the round if the<br />
attack protocol is tripped, turning the round to a<br />
fine spray that quickly dries into a thin dust. I was<br />
told the round loses some effectiveness when<br />
operating across grids and can’t affect electrosapients<br />
on hosts because the programming protocols<br />
require some level of local device ID capture<br />
to hit the various microprocesses that are running<br />
on each local device for the overall <strong>Matrix</strong>. Hitting<br />
something that is currently loaded onto or inhabiting<br />
a device has the opposite effect of attacking<br />
across grids, making it more effective.<br />
Even though the rounds are named for a famous<br />
hunting rifle, they are mainly made for pistols and<br />
submachine guns due to the load size and the limited<br />
effective range. I discussed this with a manufacturer<br />
and pointed out the difficulty of hunting a<br />
technocritter at such a close range. He mentioned<br />
a rifle caliber in the works, but prototypes had thus<br />
far not overcome the physical damage caused by a<br />
round of sufficient mass for that range of effective<br />
and accurate flight.<br />
KILL CODE Fragging ignorant fragheads. “No physically damaging<br />
attack”?! Just an electronic assault in their brain!<br />
> Netcat<br />
> As you can tell by her anger … yes, they work against<br />
technomancers!<br />
> Clockwork<br />
E0-E0 ROUND RULES<br />
E0-E0 rounds use Light Pistol ranges and cause <strong>Matrix</strong><br />
Damage to technosapients (including AIs), technocritters, and<br />
technomancers. A standard Ranged Attack roll is resisted with<br />
a <strong>Matrix</strong> (Intuition + Firewall) or Physical (Reaction + Intuition)<br />
Defense roll. If the attack hits, roll <strong>Matrix</strong> Damage Resistance<br />
(Device Rating + Firewall) as normal, with a +2 modifier for each<br />
level of grid difference (public/local/megacorporate) between<br />
the attacker and target. The attacker has to choose what grid<br />
the rounds operate on at the time of purchase. If the AI or<br />
e-critter is inhabiting a device, they suffer a –2 modifier to their<br />
Damage Resistance.<br />
TYPE DAM MOD AP MOD AVAIL<br />
COST (10<br />
ROUNDS)<br />
E0-E0 — — 5R 50¥*<br />
E0-E0 Rifle –4 –4 5R 100¥*<br />
*The base price is for rounds for the public grid. Rounds<br />
for local grids are 60. Rounds for megacorporate grids are 100.<br />
ARROWLINK RULES<br />
The ArrowLink allows the user to ignore all Noise<br />
modifiers across a distance between the user and the<br />
hit target, making it able to bypass jammers, local spam,<br />
environmental modifiers, distance, etc.<br />
Hitting and sticking the arrow requires 2 net hits on<br />
the Attack Test and does no damage. Removing the arrow<br />
requires an Extended Strength (4 + net hits, 1 Complex Action)<br />
Test. Severing the cord cuts the connection and requires a<br />
Strength (2) Test or 1 box of Physical Damage, leaving the<br />
arrow in place.<br />
Firing even a single meter beyond the cord length causes<br />
the cord to snap.<br />
TYPE AVAIL COST<br />
50m 6R 25¥<br />
100m 8R 75¥<br />
200m 10R 200¥<br />
500m 12R 400¥<br />
ARROWLINK<br />
This one was a little weird, and I include it here<br />
because it is technically ammo, but really just intended<br />
as an accessory, though I imagine some<br />
creative hoophats could come up with an offensive<br />
use. To the point!<br />
The ArrowLink looks like a standard arrow shaft<br />
with a short cord attached to a hook, dataplug<br />
on the end, and a broadhead arrowhead made of<br />
black rubber. The plug goes into any universal port<br />
on a <strong>Matrix</strong> device. The shaft of the arrow is filled<br />
with a microfine datacord that comes out during<br />
flight and just behind the head is a broadcast<br />
nodule. The cord creates a one hundred percent<br />
noise-free connection between the arrow and the<br />
connected device.<br />
The various models include different lengths of<br />
cord, the most expensive part of the arrow. Once<br />
used they can’t be reused because of the special loading<br />
method of the cord to prevent breakage in flight.<br />
The head is made of an ultra-adhesive material capable<br />
of sticking to all but the most slippery surfaces.<br />
The goal of the ArrowLink is to make a perfect<br />
connection between a commlink or cyberdeck,<br />
usually the latter, and a point outside of an area of<br />
intense <strong>Matrix</strong> interference.<br />
> These are also great for tagging a living target and giving<br />
you a quick window of clean signal to scrag as much<br />
of their wireless gear as possible. Even if they yank the<br />
arrow and drop it, it’s usually close enough to them to<br />
keep a clean signal.<br />
> Hexatite<br />
> It doesn’t even have to hit a person. Hit the nearby<br />
building and no one even realizes they are point blank for<br />
a clean cyberattack until it’s way too late.<br />
> Glitch<br />
GRENADES<br />
Sometimes the oddest friendships can create<br />
some of the most interesting results. Much like the<br />
looper rounds discussed above, several of these<br />
grenades came from the drunken late-night conversations<br />
between Byom and 3D around a trashcan<br />
fire in Hoodville in the Chicago CZ. It’s what<br />
happens when a tech expert and a demolitions<br />
expert get together and start brainstorming. Other<br />
entries here are inbound from Evo’s labs (guess<br />
who designed those) and leave a bad taste in my<br />
mouth, but I can’t lie—they’re effective.<br />
Kyle Jones (Order #16164256)<br />
52 DIPS & CHIPS >>
KILL CODE So basically they made high-intensity spam-jammers,<br />
with visual coding, that are disposable.<br />
> Bull<br />
> But the rabbits are so funny! I did a little program tweaking<br />
and mine all have little Slamm-0! style bats for ears.<br />
> Slamm-0!<br />
> I made cat ones. Duh.<br />
> Netcat<br />
FUZZY GRENADE RULES<br />
Fuzzy grenades come in varying Power levels. The Power<br />
is the base Noise modifier for the grenade. This Power goes<br />
down by 1 for every 2 meters from the point of origin. The<br />
maximum Power currently available is 20. The Noise lasts for<br />
2 Combat Turns.<br />
GRENADE AVAIL COST<br />
Fuzzy 10R 20¥ x Power<br />
KILL CODE Technos hate these even more. The momentary separation<br />
from the <strong>Matrix</strong> can be debilitating.<br />
> Clockwork<br />
COS GRENADE RULES<br />
The grenade interrupts all <strong>Matrix</strong> access (and with it,<br />
all wireless bonuses) for all devices within the affected<br />
area. Anyone using a commlink, cyberdeck, or RCC in full<br />
VR mode immediately suffers dumpshock (see p. 229, SR5).<br />
Drones separated from their RCC continue to follow their last<br />
commands until they reconnect.<br />
A device that loses its <strong>Matrix</strong> connection alerts its user<br />
that it will shut down and reboot automatically at the end of<br />
the present Combat Turn. The user may prevent it from doing<br />
so with a Simple Action (or a Free Action via DNI). Multiple<br />
devices require separate actions unless they are slaved to<br />
the same master device. Devices that reboot come back<br />
online at the end of the following Combat Turn.<br />
Technomancers in range must resist 10S damage and are<br />
temporarily severed from the <strong>Matrix</strong>.<br />
GRENADE AVAIL COST<br />
CoS 10R 500¥<br />
DOUSER<br />
I am an advocate for the advancement of beneficial<br />
(especially to my credstick) technology.<br />
That said, I will openly admit that I take issue with<br />
some of the drek coming out of Evo, because I<br />
know full well how they got it. On the backs of<br />
Monad slaves that somehow bought into Evo’s<br />
“meta-friendly” image and decided it was better<br />
to work for them than to escape the shackles of<br />
this world and shoot off into the stars.<br />
Okay, maybe I’m a little jealous, but Evo has<br />
been working their big brains and using them to<br />
develop tech that is leaps and bounds ahead of<br />
competitors (until they get stolen) for nothing<br />
more than a prison within their own corp.<br />
Sorry for the sidetrack. Douser is all sorts of<br />
scary. The basic adverts for the grenade seem<br />
pretty mundane. Toss it out and let it wear down<br />
the protective code of all local hardware. Slightly<br />
more technical, it does a focused attack on the<br />
Firewall of every device in the area of effect. How<br />
it does this is the truly scary part. Monads aren’t<br />
afraid of nanites (unless it’s the frag-all crazy ones<br />
that zipped up Boston), so they have no problem<br />
designing a few new bits of tech that utilize some<br />
of their own groupthink-designed nanotech. That’s<br />
the Douser design.<br />
When the grenade explodes, it releases a vapor<br />
cloud over a narrow area. This vapor cloud isn’t<br />
just heated water vapor; it also contains a massive<br />
volume of nanites. The nanites merge processing<br />
power and programming for a single purpose. No,<br />
not overwriting your brain—stop living in the past.<br />
In the case of Douser, the nanites ravage the Firewall.<br />
Get it? FIREwall. Douser. So funny. The nanite<br />
programming can shred the defense systems of<br />
low-end electronics in a blink, leaving them vulnerable<br />
to attack, and it softens even the highest-end<br />
systems.<br />
Best thing is, they don’t discriminate, and they<br />
hit every bit of tech in range. Only thing that can<br />
keep you safe, is a full shutdown. Even killing the<br />
wireless doesn’t stop them from landing on you<br />
and close enough to access via a touchlink style<br />
system.<br />
> Not to go off-topic, but I know Mr. Johnsons in at least<br />
twelve different cities who are running Evo contracts at<br />
an alarming rate. The money is there if you’re up for the<br />
variety of new challenges you may face.<br />
> Fianchetto<br />
Kyle Jones (Order #16164256)<br />
54 DIPS & CHIPS >>
KILL CODE Biggest issue I’ve come across with current ops on Evo:<br />
overlap. Teams running into other teams going after R&D<br />
in the same facility.<br />
> Mika<br />
> Hackers running Wrapper programs to look like locals are<br />
getting into scuffles with fellow runners and bringing IC<br />
down on everyone’s head. It’s ugly out there, kiddos.<br />
> Bull<br />
DUMDUM<br />
While attacking the Firewall of a system was a<br />
great first step and seemed logical, the techs at<br />
Evo then went a step further. Why not ignore<br />
the protection protocols completely and instead<br />
flood the processing system with pointless functions<br />
to the point of overload and shut down devices<br />
that way?<br />
DumDum goes after the Data Processing system<br />
instead of the Firewall software. Instead of<br />
leaving a device defenseless or forcing it to shut<br />
down, the cloud of DumDum nanites gobs up the<br />
system with junk processes and prevents the system<br />
from performing normal operations. There<br />
is no shutdown warning with DumDum, just a<br />
sudden inability to complete any kind of task. A<br />
successful barrage will make even voice or text<br />
transmission impossible, and the only report you<br />
get is the “thinking” icon of your particular device.<br />
Transys devices are particularly humorous, as the<br />
little fighting knight slows down and moves in a<br />
herky-jerky slow motion. A full shutdown/reboot<br />
gets the system clean, but it has to be a hard shutdown<br />
and restart (a.k.a. holding down the power<br />
button), because the reboot process is slowed by<br />
the attack as well. Devious little system they developed<br />
here. No real warning until you need to<br />
do something.<br />
> I can’t decide whether the use of weaponized nanites<br />
so soon after the events of Albuquerque and Boston is<br />
a sign that we have way too short a memory, that we’re<br />
extremely resilient when it comes to tech, or that we’re<br />
just that fragging stupid.<br />
> Bull<br />
> The last option. Definitely!<br />
> Slamm-0!<br />
> Widespread understanding of the truth of CFD just isn’t<br />
there. Every corp puts enough spin to make its citizens<br />
feels safe, and most of the major nations of the world get<br />
DOUSER RULES<br />
The nanites burst out over a five-meter-radius sphere.<br />
The nanites make a single Rating x 2 [Rating] (Firewall) Test.<br />
Hits over the threshold decrease the Firewall rating of all<br />
devices in the area at a rate of –1 per net hit. Cyberware is<br />
also targeted by the attack.<br />
When a device’s Firewall is reduced to zero, it alerts its<br />
user that its protection software has been compromised, and<br />
that it will shut down and reboot automatically at the end of<br />
the present Combat Turn. The user may prevent a device from<br />
shutting down with a Simple Action (or a Free Action via DNI).<br />
Multiple devices require separate actions unless they are all<br />
slaved to the same master device.<br />
Firewalls remain at their lowered state until rebooted.<br />
Devices that shut down and reboot come back online at the<br />
end of the following Combat Turn with their Firewalls fully<br />
restored.<br />
Gamemaster note: This attack could take a lot of recordkeeping<br />
time. To simplify the process, have the character<br />
take note of the final hits total and only worry about it if they<br />
try to use a piece of gear or the piece of gear gets digitally<br />
attacked. The number of hits divided by two can act as a<br />
simple distraction modifier for the Combat Turn as their AR is<br />
flooded with warnings.<br />
The maximum rating of the Douser grenade is 10.<br />
their news from corp feeds.<br />
> Snopes<br />
> Blaming nanites for CFD is like blaming a gun for shooting<br />
someone. They were a tool to complete a task. I won’t<br />
say it could never happen again, but I am saying that<br />
the number of jobs getting offered by AIs to go free their<br />
fellows from some dark and well-guarded places is high.<br />
> Ma’fan<br />
ACCESSORIES AND TOYS<br />
This is kind of my catch-all category for things<br />
that don’t fit elsewhere. It’s a bit of a hodgepodge,<br />
but it’s good stuff.<br />
FACELESS<br />
GRENADE AVAIL COST<br />
Douser (Rating x 2)F Rating x 50¥<br />
This could have gone in the Cutting Aces file, as it’s<br />
perfect for those who prefer not to be identified.<br />
KILL CODE Every runner in the world needs to use these things.<br />
They’re killer high-end tech, with the price tag to match,<br />
but these babies are bringing the shadow back to<br />
shadowrunning.<br />
> Mika<br />
> I know a fellow who is quite protective of his anonymity<br />
and used both a nanopaste mask and the Faceless lapel<br />
pin in the form of a rose to make sure no one can be sure<br />
it’s him passing through security.<br />
> Thorn<br />
> A rose, eh? Don’t know who that could be. Is it an Irish<br />
rose perhaps?<br />
> Slamm-0!<br />
> It’s advice without pretension, Slammy. You should try it<br />
sometime.<br />
> Thorn<br />
> Seriously, talking about someone else when we all know<br />
it’s you is pretty much the definition of pretentious.<br />
> Slamm-0!<br />
> Don’t sell the authorities short on getting to those devices<br />
that actually snag your face. That hardwired convenience<br />
store cam may have gotten you, but the cash they slipped<br />
the owner, or the beating they gave him, just make the<br />
intel less useful in a court of law.<br />
> Black Knight<br />
> Like most of us will ever see a court of law.<br />
> Balladeer<br />
BOOSTER CLOUD<br />
Another creation using nanites coming out of<br />
Evo’s labs, but also being produced by Saeder-Krupp<br />
and Renraku. Which means we know<br />
who contracted some jobs against Evo. Anyway,<br />
the booster cloud is a nanite-filled aerosol can<br />
about the size of a can of pepperpunch. When<br />
dispensed, the nanites are preprogrammed to<br />
enhance a specific <strong>Matrix</strong> function. The cans<br />
were originally meant as an in-the-field booster<br />
for corporate deckers but have slipped onto the<br />
streets, like most super-handy tools.<br />
Data spike cans are some of the most com-<br />
Kyle Jones (Order #16164256)<br />
56 DIPS & CHIPS >>
KILL CODE These things are great for pre-planned gigs or a little<br />
boost on the fly. Toughest trick is getting them past<br />
security, but I know a secondary-market guy who<br />
does custom casings. Spray paint, inhalers, perfume<br />
bottles—If it comes with a spray nozzle, he can probably<br />
fit a booster into it.<br />
> Slamm-0!<br />
MULTIPROGRAM<br />
OPERATING SYSTEM<br />
If it works in a piece of cyber, someone usually<br />
figures out how to make it work outside said<br />
piece of cyber. Much like the internal system of<br />
the datajack plus (see below), the multiprogram<br />
operating system (MOS) allows for the addition<br />
and operation of a plethora of additional programs.<br />
Without the additional computing power<br />
that the d-plus pulls from the brain, the MOS requires<br />
an extensive series of processors, pushing<br />
its cost up and even beyond the d-plus, but hey, it<br />
doesn’t require a hole in your skull. (I know, not a<br />
concern, but I’ve already caught tons of flack for<br />
the cost!) The system comes with a datacord and<br />
insulated storage case as it’s too large to mount<br />
BOOSTER CLOUD RULES<br />
A Simple Action disperses a half can, a Complex Action<br />
disperses the whole can. Half the can offers a +1 dice pool<br />
modifier, +1 to the applicable limit; the whole can offers a<br />
+2 dice pool modifier, +1 to the applicable limit. The quantity<br />
released determines the bonus to a single type of <strong>Matrix</strong><br />
Action, for up to 3 Combat Turns depending on the local air<br />
movement (winds, spells, ventilation systems, etc.).<br />
TYPE AVAIL COST<br />
Brute Force 6R 250¥<br />
Control Device 6R 200¥<br />
Crack File 6R 150¥<br />
Crash Program 6R 150¥<br />
Data Spike 8R 300¥<br />
Edit File — 150¥<br />
Erase Mark 6R 150¥<br />
Hack on the Fly 6R 250¥<br />
Hide 6R 150¥<br />
Jam Signals 6R 150¥<br />
<strong>Matrix</strong> Perception — 100¥<br />
Reboot Device 6R 250¥<br />
Snoop 6R 200¥<br />
Spoof Command 6R 250¥<br />
Trace Icon 8R 200¥<br />
Custom Case 6 200¥<br />
KILL CODE Don’t let this thing get near you deck when it’s operating.<br />
The processors can barely cool themselves, and the box<br />
gets hot enough to burn flesh. Use the datacord and<br />
insulated box.<br />
> Pistons<br />
> I don’t recommend it, but I’ve used the box as a painful<br />
distraction before by running it while someone was trying<br />
to procure it from me during a field test.<br />
> Slamm-0!<br />
> You field-tested these? How hot do they run?<br />
> Glitch<br />
> Took a top-of-the-line model on a rural op and cooked an<br />
egg on it. No joke. It wasn’t necessary—just wanted to see<br />
if it would work.<br />
> Slamm-0!<br />
Kyle Jones (Order #16164256)<br />
58 DIPS & CHIPS >>
KILL CODE You had a real egg and you cooked it on your tech toy?<br />
> /dev/grrl<br />
> I had a lot of eggs as I was hiding out in a henhouse at the<br />
time. I ate so many, I’m kind of over them.<br />
> Slamm-0!<br />
BOOSTER CHIPS<br />
While MCT was putting technomancers through<br />
the black site torture program, Evo was using some<br />
of their newest assets to infiltrate and steal the research<br />
data MCT was gathering. Using biological<br />
readings from a myriad of tests, Evo managed to<br />
develop a simchip-based protocol that enhances<br />
certain aspects of a technomancer’s living persona<br />
through short bursts of BTL-level feeds. As you<br />
would expect, there’s a small risk of addiction due<br />
to to these feeds, but the addiction numbers were<br />
lower in test subjects, likely due to the focused nature<br />
and purpose of the chips. The chips come in<br />
four varieties, one for each aspect of the living persona,<br />
with basic grades of the chips available commercially.<br />
There are also some seriously ampedup<br />
versions on the streets that have cooler names<br />
thanks to their shady dealers. Overuse and mixing<br />
the chips can cause issues, but a troublesome<br />
headache is better than getting brainfried by IC.<br />
The big tech jump here is a slotless BTL. The<br />
chips have a series of pins with a mix of sensors<br />
and stimulators. When applied to the cranial region,<br />
the pins transmit the signal directly to the<br />
brain, like a single-spot trode. The chips need<br />
bare skin, meaning many technomancers who use<br />
them keep a patch of their scalp shaved rather<br />
than sticking the chips on their foreheads.<br />
> If you can look past the source of the initial research and<br />
the forces used to steal it, these chips are a handy little<br />
tool for technomancers everywhere. The headache claim<br />
might be brushing problems under the carpet, but I’ve<br />
found it’s more about usage at that point. If you run a<br />
bunch of those street chips together, you’re asking for a<br />
hurting, but the commercial boosters aren’t terrible.<br />
> Netcat<br />
> Be careful about picking up the commercial ones at your<br />
local Stuffer Shack in areas where technomancers aren’t<br />
wanted. You may not have a problem, or you may walk<br />
out the door to a group of thugs that got tipped off by<br />
the clerk. Not to mention the sales records getting sold<br />
or stolen and ending up in the hands of any number of<br />
hatred-filled policlubs.<br />
> Respec<br />
> I know Clockwork won’t mention it, despite his<br />
involvement, but a number of runner teams around the<br />
country have been contracted to swap real booster chips<br />
for fakes in stores. The grapevine claims that some have<br />
had their pins coated with DMSO and an unpleasant<br />
cocktail, but most just claim they don’t work. Care to<br />
comment, Clockwork?<br />
> Slamm-0!<br />
> Claims are bogus. Between Evo feeding the world a line<br />
of garbage about these and other corps jumping on the<br />
bandwagon with chemical-laced brain boosters and<br />
pitching the same effect, you’re all getting fed a load<br />
of garbage. I deal with my problems head on, not by<br />
poisoning them on the sly.<br />
> Clockwork<br />
> We all know better than to believe that!<br />
> Netcat<br />
BOOSTER CHIP RULES<br />
The rating of the booster chip adds directly to both the<br />
living persona attribute to which it is connected, increasing the<br />
limit, and to all dice pools where that attribute is involved. The<br />
modifier is never applied twice to the same test—for example,<br />
in a <strong>Matrix</strong> Defense Test that already involves the Firewall<br />
attribute, the dice pool increase for the related test would not<br />
also be applied, since Firewall was already increase. The chip<br />
requires a Simple Action to attach, and it runs for 2 Combat<br />
Turns. At the end of the chip’s duration, the chip inflicts (Rating)<br />
S damage, resisted by Body. For each other chip simultaneously<br />
in use, that damage increases by 2, meaning a technomancer<br />
running a series of Rating 4 chips would need to resist 10S, 8S,<br />
6S, and 4S as their durations ended.<br />
The chips have an Addiction Rating equal to the total rating<br />
in use, and a threshold of (2 + 1 for every additional chip in use).<br />
TYPE RATING AVAIL COST<br />
Attack<br />
Booster<br />
Sleaze<br />
Booster<br />
Data<br />
Processing<br />
Booster<br />
Firewall<br />
Booster<br />
Armor<br />
Defeating<br />
1–2 — Rating x 50¥<br />
1–2 — Rating x 50¥<br />
1–2 — Rating x 50¥<br />
1–2 — Rating x 50¥<br />
3-4 (Rating x 4)R Rating x 250¥<br />
Slick Willy 3–4 (Rating x 4)R Rating x 250¥<br />
Data Dynamo 3–4 (Rating x 4)R Rating x 250¥<br />
Fortified 3–4 (Rating x 4)R Rating x 250¥<br />
KILL CODE Great for those just out to do the job. They lack any kind<br />
of flexibility. Even the other locked designs have some<br />
program variability for tough spots. If you run with the N<br />
(or run with a decker with one), know that versatility is not<br />
on the menu.<br />
> Pistons<br />
FUCHI CYBER-EX SERIES<br />
Similar in design to the N-series, the Ex-series<br />
offers the same custom system design but instead<br />
of no processors to run programs, it offers<br />
a unique program sub-processor that allows a<br />
greater number of programs to be run. Despite<br />
the steep price tag, the programs aren’t included,<br />
but each system has enough memory to store<br />
twice the number it can run at any given time for<br />
those who want options. Purchasers appreciate<br />
the extra program capacity, even if it means sacrificing<br />
some of the capabilities of the deck itself.<br />
Programs aren’t included, despite the steep price<br />
tag, but the system has enough storage memory<br />
to hold as many as you can afford.<br />
> I like the thought here, and the heavy program load<br />
makes up a little for the lack of versatility. Then again, it<br />
also allows for a very focused device with some programs<br />
around to protect you long enough to run if things go<br />
south.<br />
> Pistons<br />
Kyle Jones (Order #16164256)<br />
60 DIPS & CHIPS >>
KILL CODE Careful trying to tweak the program complement on these.<br />
The hardware inside is specifically designed to prevent<br />
tampering. Plenty of deckers have turned their expensive<br />
tech into shiny junk by trying to swap out program blocks<br />
and missing a pin or two.<br />
> /dev/grrl<br />
HUNTER DECKS<br />
Similar to security decks, hunter decks are<br />
utilized by a unique class of newly developing<br />
electronic specialists known as E-Hunters. These<br />
cyber-security specialists are taking their work<br />
EX-SERIES RULES<br />
Ordering a custom setup costs the amounts listed below.<br />
For the Ex-series, a deck’s Device Rating determines the<br />
maximum rating of every other attribute, but it can run a number<br />
of programs equal to the Device Rating plus two.<br />
ATTRIBUTE COST AVAIL<br />
Deck Rating (Deck Rating x 2)R Rating x 10,000¥<br />
Attack — Rating^3 x 500¥<br />
Sleaze — Rating^2 x 500¥<br />
Data Processing — Rating^2 x 500¥<br />
Firewall (Rating x 4)R Rating^3 x 500¥<br />
on the offensive, focused on the new technosapients<br />
and e-critters (mostly the former, though<br />
the latter occasionally find themselves in similar<br />
habitats). These decks focus on one thing and one<br />
thing only: killing. Or more accurately, derezzing<br />
AIs and other purely electronic entities. They have<br />
their specific limitations and protections but are<br />
designed to be of limited use for regular hacking,<br />
and they are exemplary at the dangerous job of<br />
e-hunting, including being devoid of a sim-inhibitor,<br />
meaning they run on hot-sim all the time.<br />
Makes you fast and ready to rock and roll at any<br />
moment, but it also means you had better be at<br />
SECURITY DECK RULES<br />
All security decks come with special anti-tamper systems that brick the device if programs are changed. Changing a program<br />
block requires a Logic + Hardware [Mental] (Device Rating x 2, 1 hour) Extended Test. If any roll does not achieve any hits, the deck<br />
is bricked.<br />
MODEL RATING ATTACK SLEAZE DATA PROC. FIREWALL AVAIL COST<br />
Guard 2 3 1 2 4 3R 39,000¥<br />
Programs: Encryption<br />
Shield 4 4 1 3 5 6R 98,000¥<br />
Programs: Encryption, Shell<br />
Fortress 6 6 1 5 8 9R 377,000¥<br />
Programs: Encryption, Shell, Armor<br />
Great Wall 8 8 1 6 10 12R 774,000¥<br />
Programs: Encryption, Shell, Armor, Biofeedback Filter<br />
KILL CODE These are dangerous, plain and simple. They offer a lot of<br />
hitting power, solid protection, and no chance of sleazing<br />
your way out of trouble. If you go out operating with one<br />
of these, there’s only one way you’ll be dealing with your<br />
problems. Directly.<br />
> /dev/grrl<br />
SHADOW WARRIOR RULES<br />
This deck adds +1 limit for <strong>Matrix</strong> Sleaze actions, and a<br />
+1 to the Sleaze attribute when that is configured to be the<br />
highest attribute.<br />
EVO SUBLIME RULES<br />
When jacked in using VR, the decker faces challenges<br />
performing actions outside the <strong>Matrix</strong>. Any non-<strong>Matrix</strong> actions<br />
suffer a –10 dice pool modifier and –3 limit reduction (to a<br />
minimum of 1). It’s just enough control to pull out a cable to<br />
a physical machine that you are link-locked into, or fire wildly<br />
into melee.<br />
AZTECHNOLOGY<br />
SHADOW WARRIOR<br />
Building on the success of the Microtronica Azteca<br />
200, Aztechnology has produced an affordable<br />
deck that caters to deckers who don’t want<br />
to be seen.<br />
Exactly how Aztechnology optimized a deck for<br />
stealth in this way is a puzzle—they may have applied<br />
some of their research into technomancers,<br />
or they may have some insight, back door, or (most<br />
likely) leverage on the Grid Overwatch Division. Either<br />
way, they may have an advantage in the <strong>Matrix</strong><br />
for a while, until their competitors catch up.<br />
EVO SUBLIME<br />
Only available as an implanted deck, the Evo Sublime<br />
takes transhumanism to the next level by allowing<br />
VR hackers to take some limited actions in<br />
the physical world. Splitting attention across the<br />
<strong>Matrix</strong> and the meat world is distracting, and it<br />
requires significant concentration to perform actions<br />
outside VR.<br />
> This is more dangerous than it seems. The mix of feeds<br />
and poor control make almost any activity dangerous.<br />
Beware when trying to use this for more than just a little<br />
self-preservation by yanking your cord.<br />
> Glitch<br />
FAIRLIGHT DESTINY BLADE<br />
Fairlight has long been a leader in cutting-edge<br />
electronics, but their Excalibur range has been out<br />
Kyle Jones (Order #16164256)<br />
62 DIPS & CHIPS >>
KILL CODE
KILL CODE This program is straight trash-hacker software. If you can’t<br />
be bothered to run a baby monitor and know when you’re<br />
in trouble and instead would rather bring GOD down on<br />
some poor unsuspecting slob, don’t ever let me find out.<br />
I will rain down a hell far worse than the simple KO and<br />
pickup of GOD.<br />
> Glitch<br />
> Yeah, this. I appreciate people knowing this is out there,<br />
but seriously, if you want any hacker cred, don’t use this<br />
Kyle Jones (Order #16164256)<br />
64 DIPS & CHIPS >>
fragging cheatware. I don’t often agree with the corps,<br />
but making this thing equivalent to murder is legit in<br />
my book.<br />
> Bull<br />
> Thank you, white hats. For all of you real hackers out<br />
there, use this to your heart’s content. Pulling punches<br />
isn’t our job, and as long as GOD is going to keep coming<br />
down and acting with impunity, we can make a few cases<br />
to prove how recklessly those slitches play the game.<br />
They don’t care if they rain down black hammers like it’s<br />
monsoon season, and I’m not taking the blame for that.<br />
This program lets you skip eyeballing your baby monitor<br />
every half second and lets you know just when the drek<br />
hits the fan. If it never hits, it never hits, and that’s the goal<br />
anyway, but if we’ve gotta play by GOD’s rules, frag them<br />
if I’m playing anywhere close to nice, because they sure<br />
as frag don’t.<br />
> ICPK<br />
> You can think that all you want. But when you are keeping<br />
a low profile and some two-bit hacker uses a Cry Wolf and<br />
you’re the one they bring the brimstone down on, you’ll<br />
change your tune.<br />
> Respec<br />
> Seriously? Looking at the user data on an average<br />
grid like Emerald City and knowing the general runner<br />
community of Seattle, I can calculate the odds of this<br />
program hitting a fellow hacker, be they unassuming<br />
decker or a random techno, at about 100,000 to 1.<br />
Seeing as the number of deckers in Seattle who might<br />
use this program is also relatively low—well, you can<br />
take your “it happened to a friend of a friend” tale and<br />
go tell it to the gullible. My efforts are worth more than<br />
any average sheeple hack any day.<br />
> ICPK<br />
> Might not necessarily agree, but more varying viewpoints<br />
are nice. Glad you’re expanding access a little, guys.<br />
> /dev/grrl<br />
CYBERWARE<br />
AND BIOWARE<br />
It’s not a lot, but what I have lined up is high-quality.<br />
This is bleeding edge and I’ve got the docs on<br />
my rolodex app to make installs happen in almost<br />
every major sprawl around the globe.<br />
DATAJACK PLUS<br />
Every corp is trying to innovate a little to get a bit<br />
more of the market share. And then another corp<br />
takes their idea, re-labels it, and eventually, every<br />
CRY WOLF RULES<br />
corp has an offering, too, with almost the exact<br />
same features. The datajack plus is the latest in<br />
these efforts to get everyone to upgrade or buy<br />
the newest tech. Its basic functionality is identical<br />
to a standard datajack, offering a DNI link to<br />
devices and a filter to handle some of the local<br />
interference, but the Plus offers a small cache of<br />
memory and a processor system that links up<br />
with your commlink (or cyberdeck) with the ability<br />
to run programs. The d-plus system comes in<br />
a variety of processor speeds and cache sizes to<br />
offer a variety of options for the executive with<br />
an eye on the top spot or the electronic security<br />
specialist that needs an edge because the shadows<br />
keep getting faster and more deadly.<br />
> The jack-plus is becoming the crutch of wealthy wannabes,<br />
rather than the next step in the hacker evolution. Too many<br />
punks trying to use the myriad of programs instead of a<br />
quality deck or genuine skills.<br />
> Respec<br />
> That’s one point of view. Using these advances isn’t a<br />
crutch for everyone who gets the plus. Some people just<br />
want to have that extra edge, and the plus offers a whole<br />
porcupine worth of edges.<br />
> Pistons<br />
DATAJACK PLUS RULES<br />
The datajack plus offers space for a number of Common and<br />
Hacking programs. When connected to a commlink or cyberdeck,<br />
the datajack plus can run a number of Common and Hacking<br />
programs equal to its rating. The price includes [Rating] free<br />
programs from the dealer that come preloaded (gamemaster’s<br />
choice) but these can be changed. Maximum rating is 3.<br />
ESS AVAIL COST<br />
>> KILL CODE
KILL CODE Can’t say I know anyone with a system like this, but it<br />
can’t be easy to operate between the two realms. Even<br />
operating in an intense spam-zone can make the real<br />
world impossible to interact with—I can’t imagine a<br />
system that tries to merge the two worlds.<br />
> Balladeer<br />
CRANIAL SHIELD<br />
EARRS RULES<br />
The EARRS implant allows users to roll their <strong>Matrix</strong><br />
Initiative in a Physical encounter but limits the actions that<br />
can be performed. While running the EARRS implant, the user<br />
can move normally and perceive events in the physical world<br />
through their standard senses, but all Physical and Social<br />
Skill actions face a –10 dice pool modifier due to the system’s<br />
confusion of physical and <strong>Matrix</strong> input. <strong>Matrix</strong> Actions can be<br />
performed as normal.<br />
ESS AVAIL COST<br />
0.75 10R 30,000¥<br />
I’m only including this as a favor to a friend who<br />
wants people to know they exist. No one in their<br />
right mind would ever intentionally get one installed.<br />
The system is a series of emitters implanted<br />
into the skull. The emitters throw off a<br />
low-level interference signal that inhibits wireless<br />
connections between devices in the cranium<br />
and outside. A bypass, like a datajack, can be<br />
used for access, but all wireless connections fail.<br />
The system was supposedly designed to protect<br />
couriers from getting their headware hacked, but<br />
the existence of datalocks and the ability to shut<br />
down wireless capability made plenty of skeptics.<br />
Digging around for the original design traced the<br />
whole thing back to MCT, and some additional<br />
specs showed that the system also blocks technomancers<br />
from accessing the <strong>Matrix</strong>. So now<br />
we know why they made it.<br />
> There is no reason for this to exist. This is some of the<br />
most deplorable tech I have seen since cortex bombs.<br />
There are no good uses for this!<br />
> Netcat<br />
> I’ll probably catch flak for this, but here goes. The<br />
market for this implant is parents of technomancer<br />
kids. I’m not a proponent of this by any means, but it’s<br />
hard being a teenager and a technomancer. Or even<br />
being an adult and a technomancer. This implant is<br />
marketed as a way to shut off the overwhelming stream<br />
of signals constantly battering a young technomancer.<br />
It’s marketing, I know, and there are so many ways to<br />
protect them without cutting off access to a natural<br />
talent, but a lot of parents aren’t technomancers<br />
themselves and don’t understand. They just see it as<br />
something that is hurting their child, and they look to<br />
this as a permanent solution.<br />
> /dev/grrl<br />
> Those parents don’t deserve those kids.<br />
> Netcat<br />
> Here’s a growing business for you: hacking clinics that<br />
offer this “treatment” and then snatching kids before<br />
surgery. The jobs vary in pay depending on the delivery<br />
target for the kid. Delivering kids to a hooder looking to<br />
help a young techno brings in low pay, while selling them<br />
to a corp or (sorry, Orange Queen) a dragon pays better.<br />
Looking into who you’re working for is a good idea here,<br />
and before you go thinking about welching on the deal<br />
in order to keep a young technomancer out of the corp’s<br />
hands, remember they’re a person and will need to be<br />
taken care of. Not to mention the fact that most of them<br />
are already convinced by mom and dad that this is the<br />
best solution to help them with their condition.<br />
> Fianchetto<br />
Kyle Jones (Order #16164256)<br />
66 DIPS & CHIPS >>
KILL CODE Great. Now we can make freaks.<br />
> Clockwork<br />
> Already could. Isn’t that how you got here?<br />
> Respec<br />
> The stealth hacking options here are the real advantage<br />
this allows. I’m as unhappy as the next person that the<br />
megacorps do all sorts of testing and even torture people<br />
to get their info, but to let those people die in vain seems<br />
a far worse offense. Better to arm ourselves with the tech<br />
and tools they discover and use it against them.<br />
> /dev/grrl<br />
IC<br />
ESS AVAIL COST<br />
0.5 10 15,000¥<br />
Sometimes it’s not just good to know what we’re<br />
able to buy, but also what might be sliding onto<br />
the market to make your lives hell. I don’t offer<br />
any kind of real sales figures here, as the corps<br />
that make this stuff code it all in house, and when<br />
they sell it, we’re talking corp-to-corp deals,<br />
which are not my area of expertise.<br />
FLICKER<br />
Megacorporations have been developing IC for a<br />
long time and have largely focused on lethal attacks<br />
or significant interference. Last year, NYPD,<br />
Inc. gained a non-lethal contract to protect several<br />
buildings in Boston, and they included cybersecurity<br />
as a part of that package. Unwilling to<br />
just dump a hacker, the boys in blue spent some<br />
money on non-lethal IC that also allows them to<br />
study your avatar. Almost as soon as the IC was<br />
developed, it was licensed to almost everyone on<br />
the <strong>Matrix</strong>.<br />
FLICKER RULES<br />
Attack: Host Rating x 2 [Attack] v. Logic + Firewall<br />
Flicker link-locks you when it hits and puts a mark on you. If<br />
you have two marks on you, it disconnects you from the <strong>Matrix</strong>,<br />
dealing dumpshock damage if appropriate. Although you<br />
have been disconnected from the <strong>Matrix</strong>, your avatar doesn’t<br />
disappear until you log back in using the same device, or after<br />
[Device Rating] rounds. It remains where you left it, unable to<br />
act, while other IC can attempt to trace your location or analyze<br />
your avatar.<br />
SLEUTHER<br />
With the development of Flicker providing a minor<br />
marketing boost, Lone Star began developing their<br />
own non-lethal IC. Instead of focusing on an intruder’s<br />
avatar, Sleuther attempts to work out your habits<br />
and trackable characteristics from the trail your<br />
virtual presence leaves. The IC has had limited success<br />
in stopping hackers but has provided the contact<br />
details of many hackers that can be found—and<br />
possibly recruited—by the Star.<br />
SLEUTHER RULES<br />
Attack: Host Rating x 2 [Attack] v. Logic + Firewall<br />
This IC puts a mark on you if it hits. Each mark provides a<br />
legitimate user with +2 dice on any <strong>Matrix</strong> Search actions or<br />
<strong>Matrix</strong> Perception tests involving you. It works by applying<br />
different behavioral algorithms and heuristics to try to work out<br />
what sort of person you are. This IC also installs tracker code<br />
into your avatar, enabling the IC to identify which grids and<br />
hosts your avatar visits after the mark lands. Marks from this IC<br />
may be removed normally.<br />
KILL CODE The Flow is meant to return “anonymous” usage statistics<br />
back to Horizon to fold back into the algorithm, but any<br />
decent decker can disable that in a variety of ways.<br />
> Slamm-0!<br />
WUXING<br />
FREQUENCY COMMLINK<br />
Wuxing may not have been as deeply embroiled<br />
in the “technomancer controversy” as other<br />
megacorps, but they must have engaged in some<br />
experimentation, as shown by this commlink.<br />
Kyle Jones (Order #16164256)<br />
68 DIPS & CHIPS >>
KILL CODE
KILL CODE Okay, gotta ask the obvious: who, what, and why<br />
should I care?<br />
> Stone<br />
> Interestingly enough, my searches found next to nothing.<br />
What I did find says that the CEO, COO, CFO, and “lead<br />
R&D programmer” is one E.D. “Ed” Lockwood. His<br />
home address is in Detroit, but it’s three years old and<br />
has no connections to a business. Lockwood is a former<br />
Ares tech who worked on the Excalibur, and from the<br />
information I found, he was basically one of several<br />
sacrificial lambs when the project went down the<br />
drekker. Other than that, nothing.<br />
> Netcat<br />
> So this guy is what, doing all this out of his garage or<br />
something?<br />
> X-Prime<br />
> Yeah, I think he is. Only way you can get their products<br />
is online.<br />
> Netcat<br />
PANTHEON INDUSTRIES<br />
PI-TAC “TACTICAL APPS”<br />
Introduced by Pantheon Industries only six<br />
months ago, tactical apps (tac-apps) are meant<br />
to both enhance a PI-TAC and allow users to customize<br />
it for their specific needs or mission profile.<br />
They function like programs in a cyberdeck<br />
but are coded to operate exclusively in PI-Tac<br />
units and cannot be used in cyberdecks that do<br />
not have a linked PI-Tac. All bonuses and benefits<br />
of a tac-app are cumulative with bonuses from<br />
a linked cyberdeck or RCC but are geared more<br />
toward decker usage.<br />
A PI-Tac master unit can load a number of tacapps<br />
equal to its rating plus two. Example: A level<br />
two PI-Tac can have four tac-apps loaded at any<br />
given time. Unlike cyberdecks and programs, it<br />
takes a Simple Action to unload a running tac-app<br />
and load a new one from storage.<br />
CO-PILOT: MK I, II, AND III<br />
One of the main features of Level III PI-Tacs<br />
is the network operator’s ability to take limited<br />
emergency control of a linked-in vehicle or<br />
drone. The Co-Pilot series of tac-apps takes that<br />
function a step further. Note: For these apps to<br />
work properly, a PI-Tac operator must have admin<br />
access and a wireless link to all target vehicles<br />
and drones.<br />
The MK I app is for Level III units and designed<br />
to give enhanced functions versus the standard<br />
benefits. With the MK I, an operator can operate<br />
the target vehicle or drone directly as if operating<br />
in cold-sim, assuming they have the necessary<br />
skill or skillsoft. However, control is less than optimal<br />
and inferior to a traditional rigger setup. Manufacturer<br />
warns that this program is best used only<br />
for emergencies or non-combat situations.<br />
> Yeah. Since when do we actually listen to the<br />
manufacturer’s warnings?<br />
> Chainmaker<br />
> This time we should. Based on my copy, it’s definitely not<br />
meant to replace a rigger system. I tested a drone swarm<br />
with it to see how far I could push. And sure enough,<br />
in simulated combat the signal started to degrade and<br />
control went down the drekker because the code couldn’t<br />
keep up. But desperate times …<br />
> Clockwork<br />
The MK II allows Level I and II PI-Tacs to remotely<br />
control a target vehicle and/or drone as if<br />
they were a basic Level III unit. However, MK I and<br />
II apps are currently incompatible with each other.<br />
> For being some kind of new “innovative” products, these<br />
tactical programs already seem to have some serious<br />
limitations.<br />
> Cayman<br />
Kyle Jones (Order #16164256)<br />
70 DIPS & CHIPS >>
PANTHEON INDUSTRIES<br />
“CO-PILOT” MK I<br />
>> KILL CODE Like any new tech, you have to make it work. Then make<br />
it better.<br />
> Rigger X<br />
> Also, “currently” incompatible. Someday, the future will<br />
be now.<br />
> Kane<br />
The MK III allows a PI-Tac operator to directly<br />
assist a pilot in operating their vehicle’s<br />
secondary systems, such as sensors or communications,<br />
allowing the pilot to concentrate on<br />
primary tasks. In emergencies, the PI-Tac operator<br />
can assist should one or more pilots become<br />
incapacitated. In extreme cases, the MK III allows<br />
a PI-Tac operator to take emergency control<br />
should all pilots become incapacitated and/<br />
or the auto-pilot systems become inoperative.<br />
> A chum in the 180 th IAR is testing these for the regiment<br />
and says that when two people are operating the same<br />
vehicle or drone together and running the MK III, they get<br />
the odd sensation of being cramped and crowded.<br />
> Turbo Bunny<br />
DOOR GUNNER<br />
Similar to the Co-Pilot, this app is specifically designed<br />
to give PI-Tac operators the ability to remotely<br />
operate powered weapon mounts (such<br />
as turrets) or launch weapons (such as missiles or<br />
rockets) on a linked vehicle. Because of the narrow<br />
focus of this program, there are no penalties<br />
associated with its use.<br />
ECM-WARRIOR<br />
Electronic warfare and electronic countermeasures<br />
continue to be mainstays of modern combat,<br />
so the ECM-Warrior tac-app is designed to<br />
give the PI-Tac operator some extra electronic<br />
ammo, whether defending against them or attacking<br />
with them.<br />
AVAIL<br />
COST<br />
12R 400¥<br />
<strong>Rules</strong>: Allows a Level III PI-Tac operator to control a target<br />
vehicle or drone as if by remote, using cold-sim. Additionally, all<br />
piloting skills have an automatic –2 penalty while operating the<br />
target vehicle in safe conditions, –3 in combat conditions.<br />
PANTHEON INDUSTRIES<br />
“CO-PILOT” MK II<br />
AVAIL<br />
COST<br />
12R 400¥<br />
<strong>Rules</strong>: Allows Level I and II operators to control drones as if<br />
in “captain’s chair mode.”<br />
PANTHEON INDUSTRIES<br />
“CO-PILOT” MK III<br />
AVAIL<br />
COST<br />
12R 400¥<br />
<strong>Rules</strong>: Allows operator to access vehicle’s secondary<br />
systems with no penalty and assist with Pilot tests at a –1<br />
dice pool penalty. If using this program as sole pilot, penalty<br />
increases to –3.<br />
PANTHEON INDUSTRIES<br />
“DOOR GUNNER”<br />
AVAIL<br />
COST<br />
12R 200¥<br />
<strong>Rules</strong>: No penalties for use; linked weapon must have<br />
smartlink and secure wireless connection. Not for use with<br />
drones. Operator must have necessary skill or skillsoft.<br />
PANTHEON INDUSTRIES<br />
“ECM-WARRIOR”<br />
AVAIL<br />
COST<br />
12R 200¥<br />
<strong>Rules</strong>: This program provides a bonus of +3 for all Electronic<br />
Warfare tests<br />
KILL CODE Several companies across the globe produce the same<br />
generic product, but with different names and logos. They<br />
all do the same thing, some for a better price.<br />
> Danger Sensei<br />
> And with varying quality, don’t forget that. But Pantheon’s<br />
Hard Case is specifically designed with the electronic<br />
warrior in mind and is produced under license by an outfit<br />
Kyle Jones (Order #16164256)<br />
72 DIPS & CHIPS >>
KILL CODE Red Anya<br />
> Nice piece of gear, but is it really a good idea for any<br />
decker—or rigger, for that matter—to go full VR in the<br />
middle of a firefight? No thanks, not for me.<br />
> Pistons<br />
SPINRAD GLOBAL/<br />
PANTHEON INDUSTRIES<br />
MERCURY-ALPHA BATTLEFIELD<br />
SIGNAL BOOSTER<br />
On the wireless battlefields of the Sixth World,<br />
electronic warfare has greater significance than<br />
ever before. Cutting off or limiting an enemy’s<br />
ability to communicate while maintaining one’s<br />
own is often a decisive factor in victory. The Mercury-Alpha<br />
Signal Booster is designed to give PI-<br />
Tac users/operators and their commanders additional<br />
advantages during combat or for normal<br />
use in remote areas.<br />
The Mercury-Alpha consists of three components:<br />
a main unit (or brain) that contains all necessary<br />
hardware, software, batteries, and data ports;<br />
a foldable/detachable micro-dish transmitter; and<br />
an optional, hardened fiber-optic cable that can<br />
directly link the brain and transmitter together.<br />
The brain weighs only about 450g and comes in<br />
a variety of shapes, depending on the user’s preference.<br />
It attaches directly to a PI-Tac master unit,<br />
commlink, cyberdeck, or RCC.<br />
When in use, the Mercury-Alpha has three distinct<br />
modes. The first is passive mode, which is<br />
specifically designed to overcome most normal<br />
obstacles, such as extreme distance or natural ob-<br />
PANTHEON HARD CASE CCOB<br />
ARMOR CAPACITY AVAIL COST<br />
12/14* 8 12R 1,700¥<br />
<strong>Rules</strong>: Provides protection for contents against physical<br />
damage only. Does not stack with other armor.<br />
Standard Upgrades: Drag handle, internal armored shell<br />
(for RCC or cyberdecks) [14]*, 3 micro-hardpoints, quick-charge<br />
battery pack.<br />
GENERIC CCOB<br />
ARMOR CAPACITY AVAIL COST<br />
8 8 10 1,000¥<br />
<strong>Rules</strong>: Does not stack with other armor<br />
Standard Upgrades: Drag handle, micro-hardpoint, weapon<br />
holster (SMG, shotgun, or assault rifle), quick-access medkit<br />
pouch (up to Rating 4).<br />
PERSONAL DRONE RACK<br />
AVAIL<br />
COST<br />
12R 500¥<br />
<strong>Rules</strong>: Can mount 3 micro drones or one small drone.<br />
Requires one micro-hardpoint.<br />
KILL CODE Details are still hush-hush, but what I’ve been able to dig<br />
up is that Pantheon agreed to license the design and the<br />
operating system code in exchange for SG manufacturing.<br />
And of course, some corps are not happy about this.<br />
> Pistons<br />
> Of course not, since someone who is not them is making<br />
money off their products! Only a matter of time before<br />
someone goes after Pantheon. If they can find them.<br />
> Mr. Bonds<br />
PANTHEON INDUSTRIES<br />
“MERCURY-ALPHA”<br />
BATTLEFIELD SIGNAL BOOSTER<br />
DR AVAIL COST<br />
5 12R 3,500¥<br />
<strong>Rules</strong>: Can only be used in one mode at a time; switching<br />
modes is a Simple Action. In passive mode, provides a +4 dice pool<br />
bonus against all sources of noise and doubles effective range.<br />
In defensive and aggressive modes, provides +2 for pertinent<br />
Electronic Warfare tests. Linked PI-Tac units can also distribute<br />
some or all of their +2 bonuses to assist other operators without<br />
a teamwork test; this requires a Simple Action. All functions and<br />
bonuses are cumulative with tactical programs and associated<br />
devices such as satellite links and re-trans units.<br />
AVAIL<br />
PANTHEON INDUSTRIES<br />
MICRO-DISH TRANSMITTER<br />
COST<br />
10R 1,200¥<br />
CYBERDECKS EX-SERIES<br />
DECK COST AVAIL<br />
Deck Rating (Deck Rating x 2)R Rating x 10,000¥<br />
Attack — Rating^3 x 500¥<br />
Sleaze — Rating^2 x 500¥<br />
Data Processing — Rating^2 x 500¥<br />
Firewall (Rating x 4)R Rating^3 x 500¥<br />
AMMO<br />
TYPE<br />
DAMAGE<br />
MOD<br />
AP<br />
MOD<br />
AVAIL<br />
COST (PER<br />
10 ROUNDS)<br />
E0-E0 — — 5R 50¥*<br />
E0-E0 Rifle –4 –4 5R 100¥<br />
Fuzzy rounds<br />
LP, MP, AR 10R 30¥<br />
HP, SMG, S 12R 50¥<br />
Looper<br />
1 7R 20¥<br />
2 8R 30¥<br />
3 9R 40¥<br />
4 10R 50¥<br />
5 11R 100¥<br />
6 12R 200¥<br />
Zapper rounds +0M — 12R 140¥<br />
ARROWLINK<br />
TYPE AVAIL COST<br />
50m 6R 25¥<br />
100m 8R 75¥<br />
200m 10R 200¥<br />
500m 12R 400¥<br />
GRENADES<br />
TYPE AVAIL COST<br />
CoS 10R 500¥<br />
Douser (Rating x 2)F Rating x 50¥<br />
Fuzzy 10R 20¥ x Power<br />
DumDum (Rating x 2)R Rating x 50¥<br />
CYBERDECKS N-SERIES<br />
DECK COST AVAIL<br />
Deck Rating (Deck Rating x 2)R Rating x 5,000¥<br />
Attack — Rating^3 x 500¥<br />
Sleaze — Rating^2 x 500¥<br />
Data Processing — Rating^2 x 500¥<br />
Firewall — Rating^3 x 500¥<br />
CYBERWARE & BIOWARE<br />
ITEM ESS AVAIL COST<br />
BioLink 0.5 10 15,000¥<br />
Cranial Shield 0.5 12 5,000¥<br />
Datajack plus 0.15 4 Rating x 3,500¥<br />
EARRS 0.75 10R 30,000¥<br />
Kyle Jones (Order #16164256)<br />
74 DIPS & CHIPS >>
SECURITY CYBERDECKS<br />
MODEL RATING ATT SLEAZE<br />
DATA<br />
PROC.<br />
FIRE-<br />
WALL AVAIL COST<br />
Guard 2 3 1 2 4 3R 39,000¥<br />
Programs: Encryption<br />
Shield 4 4 1 3 5 6R 98,000¥<br />
Programs: Encryption, Shell<br />
Fortress 6 6 1 5 8 9R 377,000¥<br />
Programs: Encryption, Shell, Armor<br />
Great Wall 8 8 1 6 10 12R 774,000¥<br />
Programs: Encryption, Shell, Armor, Biofeedback Filter<br />
HUNTER CYBERDECKS<br />
MODEL RATING ATT SLEAZE<br />
DATA<br />
PROC.<br />
FIRE-<br />
WALL AVAIL COST<br />
Fox 2 4 1 3 4 4R 68,500¥<br />
Programs: Track, Shell, Hammer<br />
Wolf 4 5 1 4 5 8R 133,000¥<br />
Programs: Track, Shell, Hammer, Decryption<br />
Tiger 6 8 1 6 8 12R 530,000¥<br />
Programs: Track, Shell, Hammer, Decryption, Hammer<br />
Shark 8 10 1 8 10 16R 1,032,000¥<br />
Programs: Track, Shell, Hammer, Decryption, Hammer, Mugger, Fork<br />
MISC. CYBERDECKS<br />
MODEL<br />
RATING<br />
ATTRIBUTE<br />
ARRAY PROGRAMS AVAIL COST<br />
Shadow Warrior 3 6 5 4 3 3 10R 225,000¥<br />
Sublime 4 7 6 5 5 4 12R 375,000¥<br />
Destiny Blade 4 7 6 5 5 4 12R 400,000¥<br />
Defender 5 8 7 5 5 5 14R 560,000¥<br />
Sleeper 4 7 5 5 4 4 14F 375,000¥<br />
COMMLINKS & RCC<br />
GEAR RATING DATA PROC. FIREWALL AVAIL COST<br />
Cyber-6RCC 5 5 5 12R 72,000¥<br />
Skirmisher 4 5 5 8R 50,000¥<br />
Last Chance 3 3 3 11 5,000¥<br />
Frequency 4 4 4 10 3,500¥<br />
Flow 5 5 5 12 4,000¥<br />
ARMOR<br />
ITEM ARM CAP AVAIL COST<br />
Generic CCOB 8 8 10 1,000¥<br />
Hard Case<br />
CCOB<br />
12/14* 8 12R 1,700¥<br />
MISC. ITEMS<br />
>> KILL CODE
KILL CODE<br />
DISK JOCKEYS &<br />
LIGHTSTREAM RIDERS<br />
There are a million hosts on the <strong>Matrix</strong>, and billions<br />
upon billions of data points. Most of them are trivial<br />
or obvious, which means one of the traits of a<br />
quality hacker is to sort through the dross to find<br />
the gold. There is no one right way to do this—the<br />
right way is the one that works. This chapter has<br />
qualities, complex forms, and Life Modules to<br />
help hackers make themselves individual, distinct,<br />
and capable of finding the <strong>Matrix</strong>’s most valuable<br />
and tightly guarded secrets.<br />
POSITIVE<br />
QUALITIES<br />
DECK BUILDER<br />
COST: 4 KARMA<br />
The character has been messing around with<br />
tech their whole life; it was only a matter of time<br />
before they found a way to push their deck’s hardware<br />
further so that it could do more than it was<br />
supposed to.<br />
The character may install 1 additional cyberdeck<br />
module (p. 64, Data Trails) into their deck.<br />
This quality may only be selected once.<br />
IMPENETRABLE LOGIC<br />
COST: 3 KARMA<br />
Some would call it precognition—this hacker<br />
calls it quick thinking. When things in the <strong>Matrix</strong><br />
start going sideways, they keep their cool, maintain<br />
their focus, and think their way around the<br />
problem. Which may well be some brutal IC bearing<br />
down on them.<br />
This quality allows the character to use their<br />
Logic in place of their Willpower attribute while<br />
using <strong>Matrix</strong> Full Defense.<br />
ROOTKIT<br />
COST: 8 KARMA<br />
The character knows how to find the crack in<br />
any system, even if it’s a minuscule one. Getting<br />
the code just right, and hitting that chain on its<br />
weakest link take a lot of mental fortitude and accuracy.<br />
A helping of luck doesn’t hurt.<br />
As a Free Action, a character may take a –8 penalty<br />
to their dice pool when they are performing<br />
a Data Spike or Resonance Spike Action one that<br />
same turn. On a successful hit, the character may<br />
add their device rating to the DV of the attack.<br />
SILENCE IS GOLDEN<br />
COST: 9 KARMA<br />
It might be anemia from all that soykaf, or perhaps<br />
there’s something about the character—maybe<br />
the <strong>Matrix</strong> just likes them. Whatever the case,<br />
for some reason the ever-present noise of the <strong>Matrix</strong><br />
is muted near this character.<br />
The noise penalty for the character and anyone<br />
within ten meters of them is reduced by 2. Anyone<br />
outside the radius who attempts to connect<br />
to the character does not benefit from the noise<br />
reduction.<br />
NEGATIVE<br />
QUALITIES<br />
AVRSE<br />
BONUS: 9 KARMA<br />
The character knows too many hackers who<br />
have been taken out while in VR, and they never<br />
saw it coming. They see VR as a trap—how can you<br />
get out of a bad situation if your consciousness is<br />
not firmly inside your body? Unwilling to take that<br />
sort of risk, the character has made AR their mode<br />
of choice.<br />
Kyle Jones (Order #16164256)<br />
76 DISK JOCKEYS & LIGHTSTREAM RIDERS >>
When in VR, the character suffers a –4 penalty<br />
to all actions if they are not in a secure location<br />
(such as a secured lair or safehouse). This location<br />
must be a place that they believe will not offer access<br />
to anyone besides themselves and their closest<br />
allies.<br />
BASEMENT DWELLER<br />
BONUS: 8 KARMA<br />
The character didn’t have a lot of friends when<br />
they were a kid … and now they still don’t have that<br />
many. What friends the character has tend to be<br />
on the <strong>Matrix</strong>, and the character’s social anxiety<br />
prompts them to keep it that way. Basically, people<br />
in real life are unpredictable and scary, and the<br />
character would rather interface from the comfort<br />
of their home.<br />
The character suffers a –2 dice pool modifier for<br />
all Social tests when meeting a someone in person<br />
for the first time. This modifier does not apply to<br />
second and subsequent encounters.<br />
BIG BABY<br />
BONUS: 4 KARMA<br />
Pain is a fact of life in the Sixth World, and shadowrunners<br />
know that better than most. While most<br />
runners accept that they are going to get hurt and<br />
are prepared to deal with it, others flinch from the<br />
possibility of damage, and this gets more severe<br />
each time they actually get hurt. When they’re<br />
out on the job, if they are burned, shot, zapped,<br />
punched, or otherwise damaged, the character<br />
becomes extremely reluctant to rejoin the fray.<br />
When a character with this quality is dealt Physical<br />
damage, they suffer a –1 penalty to combat<br />
dice pools until the enemy or obstacle that dealt<br />
the damage is overcome or destroyed.<br />
BUDDY SYSTEM<br />
BONUS: 9 KARMA<br />
Every runner knows that working with a team is<br />
always safer than acting alone. Because of stories<br />
they’ve heard or personal experience, the character<br />
gets anxious when no one’s watching their back.<br />
The character suffers a –2 to all <strong>Matrix</strong> actions<br />
other than <strong>Matrix</strong> Perception and the Hide action if<br />
they are alone, or a –1 penalty if they have an agent<br />
slotted in or a sprite compiled to back them up.<br />
DISCOMBOBULATED<br />
BONUS: 12 KARMA<br />
Whoever thought up simsense was a genius. A<br />
character with this quality doesn’t want to imagine<br />
life without it, especially because everything is a<br />
little too real. Characters who suffer from discombobulation<br />
experience feelings of disorientation<br />
whenever they work in the physical world, without<br />
virtual reality to steady their all-too-tactile hands.<br />
The character receives a –2 dice pool modifier<br />
to all tests when acting outside of AR or VR.<br />
DOWN THE RABBIT HOLE<br />
BONUS: 2 KARMA (MAX 4)<br />
The character is a sucker for clickbait, even<br />
when it’s obvious that it has nothing to do with the<br />
search they’re pursuing. They’ll start searching for<br />
building schematics for a heist, and end reading<br />
rumors about Dunkelzahn’s assassination. How<br />
did the search lead them there? No idea, but at<br />
least they learned a lot of rubbish along the way.<br />
For each level of Down the Rabbit Hole (maximum<br />
4), reduce the number of 1s necessary to roll<br />
a glitch by one whenever the character attempts<br />
to search the <strong>Matrix</strong> (so that on a roll of 8 dice with<br />
two levels of the quality, the character can glitch<br />
with only three 1s, instead of the normal five).<br />
The gamemaster may also require the character<br />
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
PARALLEL<br />
PROCESSING<br />
BY AMY VEERES<br />
Respec stared up at the ceiling in thought, reclining<br />
in the rear of Netcat’s Econovan. Their transport for<br />
tonight’s run was an inconspicuous panel van loaded<br />
with medkits, tools, hidden guns, emergency commlinks,<br />
and most importantly, the object Respec was<br />
lounging on while Netcat drove. It was a surprisingly<br />
comfortable sofa for extra passengers, willing or<br />
otherwise—definitely a step up from the hard-plastic<br />
ambulance seats found in most shadowrunner transports.<br />
And way more comfortable to lay down on.<br />
For a moment, the absurdity of her situation struck<br />
Respec. Netcat had far more experience than her,<br />
so it seemed natural to let her take the lead. Except<br />
for the fact that Respec was at least fifty years older<br />
than the other technomancer. The first-generation elf<br />
pinched the bridge of her nose, realizing this was a<br />
problem that an astronomically low number of people<br />
could ever relate to. It was her burden to bear.<br />
She climbed out of the van’s rear, having uploaded<br />
the mission parameters, required passcodes, and<br />
other data from the prep stage to a nanomemory<br />
tattoo between her toes. Nobody but weirdos bother<br />
to look there. Netcat was next out. Both of them<br />
wore dark armored clothing that might be passable<br />
as something a nightshift security agent might wear,<br />
though with no colors or logos specific to their target.<br />
On Respec’s hip rested a completely average-looking<br />
commlink. Specifically, the kind security guards<br />
at the Makoto Shiranui Memorial Hospital, Brought<br />
To You By Mitsuhama Computer Technologies were<br />
issued. The pair checked each other’s disguises before<br />
walking in opposite directions toward separate<br />
hospital entrances, outerwear for the chilly February<br />
night concealing weapons and other contraband. In<br />
a private link, they reviewed their plan.<br />
<br />
<br />
Respec winced in meatspace, doing her best to<br />
focus back on the <strong>Matrix</strong> and ignore the chill of the<br />
night blowing through her trenchcoat.<br />
> PARALLEL PROCESSING
virtuakinetic children. Test their level of technomancy<br />
and decide whether to keep them for further study<br />
or send them overseas for experiments.> The taller<br />
elf turned a pale green as AROs she had uncovered<br />
of the experiments flashed in front of her. Respec<br />
looked ready to vomit before downing a handful of<br />
pills from one of her coat’s pockets, dosing herself<br />
with an antinausea med that returned her face to its<br />
normal pasty pallor. She went back to her message.<br />
Respec closed her eyes and<br />
placed a hand over the display, just above the biometric<br />
scanner. She focused her mind and broke<br />
through the wave of fading washing past her as her<br />
complex forms went to work. The door opened with<br />
Respec none the worse for wear.<br />
Meanwhile, one of Netcat’s sprites flew into the<br />
first security terminal she encountered, and in just a<br />
couple seconds, the display welcomed Guard #631<br />
for her night shift. The tacsoft indicated to both of<br />
them that the closest doors were unlocked, so Netcat<br />
continued reviewing the details. <br />
The avatar of Respec in Netcat’s periphery, a silver-haired<br />
woman from some positively ancient simgame,<br />
gave a shaky thumb up. <br />
Netcat’s avatar, her real-life self with her features<br />
disguised in a green aura, recoiled suddenly. Netcat shook her head in the real world<br />
and began preparing a new array of sprites, these<br />
ones taking the form of glowing datachips, as was<br />
her habit. Respec likewise prepared herself, using a<br />
pistol-slide to deposit an array of datachips in her<br />
hands. Crushing them in a silent prayer to 01, she<br />
used the ritual to gather focus and put her concentration<br />
where it needed to be.<br />
Netcat messaged, while<br />
Respec was still threading a complex form to open<br />
the lock on her entrance. She eventually caught up to<br />
Netcat, who waited with an agitated look but offered<br />
no comment. They silently exited the dark, empty<br />
lobby, entering the hospital to begin their rescue<br />
mission.<br />
Respec began by connecting to the hospital’s<br />
host, another complex form shielding her from the<br />
spider’s eyes as she edited herself out of camera<br />
feeds in real time, meeting Netcat in a corner undetected<br />
by any security devices. The two squatted and<br />
watched opposite ends of the hallway, both ready to<br />
draw a weapon if a guard came along. Respec had<br />
brought long-range stun devices among what she<br />
called “some other stuff for emergencies,” while<br />
Netcat kept a light pistol—silenced, of course—in a<br />
shoulder holster beneath her jacket.<br />
Respec inquired, staring down<br />
through the darkness at the end of the hallway.<br />
Netcat couldn’t hide the smile poking<br />
at the corners of her mouth. Respec understood—<br />
technos weren’t expected to display any physical<br />
skills, so when you got a chance to flash some of<br />
them, you took it.<br />
Respec followed behind Netcat, who led her down<br />
the hall, staying one step ahead of the rent-a-cops<br />
and the spider. By the time they made it to the firstfloor<br />
security room (where the spider was based), the<br />
map Netcat had acquired before the run appeared on<br />
their AR displays. Flashing dots revealed the locations<br />
of the guards, while lighter circles around each of<br />
them representing their sensory ranges. None were<br />
near the security room they were about to breach.<br />
Respec drew her weapon and nodded to her partner.<br />
Netcat grabbed the door handle. One of her<br />
sprites flew into the door, and it unlocked silently.<br />
She pushed it open, and Respec fired three darts<br />
into the back of the dwarf inside, who fell out of his<br />
chair with a soft thud. Respec let her partner in after<br />
the dwarf was incapacitated, kneeling over his prone<br />
form while Netcat took his seat and began diverting<br />
security.<br />
Respec<br />
inquired, bricking the unconscious spider’s cyberdeck,<br />
emergency commlink, and any cyberware that<br />
looked like it might make her life more difficult.<br />
<br />
<br />
Netcat’s text actually paused. Both of the elves’ fingers<br />
brushed across opposite ends of the security terminal,<br />
enough to establish a connection. Before entering<br />
the building’s host, Netcat “spoke” again.<br />
<br />
>> PARALLEL PROCESSING
In VR, their icons appeared next to each other<br />
inside the hospital’s host. Respec conjured up the<br />
map again, this time showing each floor. Netcat<br />
stopped preparing her hack and watched her partner<br />
curiously.<br />
Respec sent.<br />
Respec produced some indeterminate data from<br />
inside her icon and pressed it into the security terminal’s<br />
icon. Eventually, it sunk into the transparent<br />
block, which lit up green. From there, she typed<br />
furiously; in reality, and in VR, a message went out<br />
through the hospital’s PA system.<br />
Words rang out. “Security personnel report to the<br />
fifth floor for a code gold. Repeat, code gold on the<br />
fifth floor. Further instructions will be given on arrival.”<br />
The message then repeated in Japanese.<br />
The system would also send similar text messages<br />
to all security personnel. “<strong>Code</strong> gold” meant a<br />
high-priority, high-security individual was coming in,<br />
the type of person who should be the focus of security<br />
efforts. It was the type of distraction that would<br />
only last until everyone figured out it was fake, but<br />
that should be long enough.<br />
Netcat and Respec turned back to the map, watching<br />
as the dots Respec highlighted rushed to the top<br />
floor. Once the last one had left the elevator, Respec<br />
turned around and continued the second stage of her<br />
plan.<br />
she sent after a few moments.<br />
Netcat asked. There was, of<br />
course, no tone on the brief text, but Respec imagined<br />
she could sense the trepidation.<br />
<br />
The two technomancers returned to their meat<br />
bodies. Respec tried not to look too pleased with<br />
herself.<br />
Netcat did not let her stay too self-satisfied. She<br />
spoke aloud for a change of pace. “Just remember,<br />
not every guard went to the fifth floor. You got some<br />
out of the way, but we still might run into trouble.”<br />
She patted Respec’s shoulder as she walked by, then<br />
gathered their things and left the security room. Respec<br />
did the same trick on the terminal and the security<br />
room’s lock on the way out, keeping the spider’s<br />
movements restricted. Assuming he woke up before<br />
the job was done.<br />
The two technomancers made their way to the<br />
hidden basement access. They moved quickly and<br />
smoothly. What security hadn’t gone to the fifth floor<br />
did not show up in their path, and the spider was<br />
down for the count. This would probably be the easiest<br />
stretch of the run.<br />
Halfway down the hall, Respec began laying out a set<br />
of palm-sized metallic devices, two stuck to the walls<br />
and one on the floor. As she finished up, she paused<br />
and breathed deeply. Preparing herself. Waiting for the<br />
devices to do what they were supposed to do.<br />
After long enough for the silence to become awkward,<br />
Respec picked up the devices and pointed to<br />
an inconspicuous closet door. <br />
Netcat didn’t say anything, though her usual stoic<br />
expression softened somewhat.<br />
“I don’t know what this is going to be, exactly,” she<br />
said aloud. “It’s not going to be good. They never pay<br />
us to break into places that are good.”<br />
“It will be the job, and we’ll deal with whatever it<br />
is. And later, we’ll erase from our memories whatever<br />
we can’t bear to keep.”<br />
Respec’s fingers brushed across the bezel of<br />
the biometric/keycard combination lock. The panel<br />
turned green, and the last of the sprite cluster Netcat<br />
compiled at the beginning of the run rushed through<br />
the widening crack to disable the gun turret on the<br />
other side of the door.<br />
<br />
Respec took up the rear, holstering her stungun.<br />
Netcat led the way<br />
through a dank hallway to an elevator. They entered,<br />
and as they sped downwards, Respec’s device pinged<br />
inside her bag.<br />
<br />
After Netcat received the message, she nodded<br />
and drew her Predator V, while Respec took out<br />
her two-generations-old Predator III.<br />
A few minutes and a half-dozen floors later, the<br />
elevator opened into a dimly lit, suffocatingly sterile<br />
hallway. Before they had a chance to step off of<br />
the elevator, they were stopped by a wave of miasma<br />
code spreading through the building’s host into their<br />
PANs and resonance link. Netcat tried to send a message,<br />
but all that came out was discordant noise. So<br />
they turned again to their voices<br />
“That’s one hell of a drone.”<br />
“Are we totally sure it’s a drone?”<br />
The conversation was cut short by the screech<br />
of metal scraping plascrete floors. Heavy footsteps<br />
combined with loud servomotors and metallic<br />
sounds joined them as the creature patrolling the<br />
Kyle Jones (Order #16164256)<br />
84 >> PARALLEL PROCESSING
halls turned a corner, trudging along a path walked<br />
so often that a pattern was worn into the hard tiles.<br />
In spite of her low-light vision, Respec found herself<br />
unable to focus on the creature’s form as it rounded<br />
the corner. It was armored, bulky, and gave off a<br />
jaw-aching burr of dissonant noise.<br />
“We should have brought more hardware than<br />
a stun-gun and a pistol each. How are we going to<br />
bring down that … thing? And if it gets close … I don’t<br />
even want to think about it.”<br />
Netcat holstered her pistol and shook her head.<br />
Respec desperately tried to urge an idea to leap from<br />
somewhere—anywhere—into her brain.<br />
Netcat spoke before any idea arrived. “We can’t<br />
scrub the mission and come back with more firepower.<br />
Security will be on to us after that code gold<br />
stunt. This is our only chance.”<br />
“That’s great, but how are we supposed to deal<br />
with that biodrone?!”<br />
“I have a plan.” Netcat stood and flexed both<br />
knees. “Get ready to bolt. You can hear it turning the<br />
corner now.”<br />
Netcat was the first of the two to run for it, with<br />
Respec following and attempting to quell a rising<br />
panic. The pair’s footsteps attracted the cyberthing’s<br />
attention, but it couldn’t turn around. It could<br />
only trudge down the hall on the route laid out by<br />
its IR camera-eyes, passing bedridden children and<br />
adolescents who were hooked up to IVs and trodes<br />
linked to a master terminal at the end of the room.<br />
“All right, let’s get it done,” Netcat said. “Stop<br />
whatever the terminals are doing to the kids. I think<br />
I have something to hold the drone off.” Netcat<br />
spread her arms and waved them forward to direct<br />
flecks of AR data in front of her. Eventually, the errant<br />
code took the shape of a cartoonish knight wielding<br />
a sword and shield. It wasn’t like the tiny creatures<br />
she usually summoned—it was metahuman-size and<br />
ready to do battle.<br />
“Great form sprite, morkhan!” Once formed, the<br />
sprite rushed off to do battle with the biodrone,<br />
keeping it distracted while its summoner began unhooking<br />
the IVs.<br />
“Mor-what now?” Respec raised an eyebrow at<br />
Netcat while her AR avatar dealt with the agent keeping<br />
the test subjects in hot-sim VR.<br />
“The hell kind of elf doesn’t even know how to<br />
swear in Sperethiel?”<br />
“The kind whose parents were human. I don’t<br />
know! Swear in Japanese like the rest of us!” Respec<br />
continued to work on the code while Netcat finished<br />
with everything except the VR electrodes.<br />
Out of nowhere, the fight in the halls dragged into<br />
the lab, where the sprite, corrupted and falling apart<br />
from extended exposure to dissonance, was barely<br />
holding off something that was most certainly not a<br />
biodrone.<br />
The two shadowrunners could finally see what<br />
was between them and the exit. It was an ork woman<br />
covered in grimy metal plating, blades for hands, and<br />
oversized cyberlegs for balance. The only traces of<br />
her metahumanity were the ragged hair around her<br />
skull and the tusks sticking out of a lipless mouth. It<br />
was a dissonant cyberzombie. It had to be, because<br />
Respec did not want to consider what else the form<br />
in front of her might be.<br />
It hadn’t showed up at a good time. Netcat had<br />
fallen to her knees thanks to the fading brought on<br />
by her sprite’s destruction. The cyberzombie felt the<br />
weakness and turned to face her, raising a blade-arm.<br />
A deafening crack sounded out. As the great form<br />
sprite fell apart, the cyberzombie collapsed, sparks<br />
and brains flying from the hole where the back of its<br />
skull used to be.<br />
Respec’s gun was still smoking. Unable to hear<br />
over the ringing from the point-blank gunshot that<br />
took the cyberzombie down, she spoke in Resonance<br />
instead.<br />
<br />
Netcat laughed, a forced, nervous sound but still<br />
quite welcome at this moment. <br />
As the excitement faded, her smile softened.<br />
Respec started dragging the corpse into<br />
the hallway’s center column.<br />
Netcat finished unhooking their targets,<br />
knowing the job was only halfway over. Then<br />
she asked Respec a question that she clearly should<br />
have been ready for but was dismayed to find out<br />
she’s not.<br />
<br />
>> PARALLEL PROCESSING
KILL CODE<br />
DATA<br />
STREAMS<br />
POSTED BY: CLOCKWORK<br />
It’s been a few weeks, and since neither of the<br />
knife-ear toasterfuckers have had anything to say<br />
about recent developments, it looks like the honor<br />
of explaining what they’re up to now falls to<br />
me. I can’t in good conscience let you guys go<br />
without knowing the latest in expanding technomancer<br />
powers. Forewarned is forearmed and all<br />
that. But buckle up, because things in these parts<br />
aren’t getting any less scary.<br />
Those of you who aren’t completely fresh might<br />
remember five or six years ago, when technomancers<br />
had these things, streams, that basically<br />
worked like a mage’s traditions. They were something<br />
you had to watch out for, but they could go on<br />
page two of the dossier when you looked at the full<br />
range of technomancer threats. It wasn’t critical information.<br />
With the lovely Ms. de la Mar’s overhaul,<br />
the technos got a big power drop, and one of the<br />
things that seemingly became disconnected were<br />
these streams. What a happy day that was …<br />
Guess what? They’re back. Or at least, something<br />
similar enough I figure the name “stream” is<br />
as good a way to describe them as any. It’s like<br />
the <strong>Matrix</strong> is cheating, and not in our favor. Not<br />
to worry, JackPoint, because this time, I’m on your<br />
side. I’ll walk you through each and every permutation<br />
of technomancy and what it lets them do.<br />
All the better when you’re worrying about one<br />
flash-frying your targeting system without knowing<br />
you’re there, or turning your drones on you, or<br />
jumping three stories with off-the-rack cyberlegs.<br />
Think those were jokes? Tall tales? Think again.<br />
HOW THEY FLOW<br />
To borrow a cliché that was outdated when my<br />
dad was still alive, these ain’t your granddad’s<br />
streams. If I had to compare them to something<br />
magical (which I do, because I know it pisses<br />
off Respec), I’d compare them to adept ways instead<br />
of magical traditions. They’ve completely<br />
changed to fit a new role in the <strong>Matrix</strong>, or are<br />
possibly a different thing entirely, and I’m very<br />
sad to report that they’ve given technomancers<br />
whole new toolkits. They’re not just freaky mind<br />
deckers anymore. Now they can be freaky mind<br />
riggers, summon sprites like they’re going out of<br />
style, and even use some cyberware. Yeah, this<br />
sounds unbelievable, but keep reading. These are<br />
real. The intel is solid. Mitsuhama doesn’t play<br />
around with technomancer rumors.<br />
> And the other shoe drops. What do we think?<br />
> Slamm-0!<br />
> As long as he’s sharing and doing nothing malicious, I say<br />
we let him finish. Deal with him when he tries to act.<br />
> Bull<br />
> Agreed, begrudgingly.<br />
> Glitch<br />
SOURCERERS<br />
You could call these guys the old-school technomancers.<br />
Not Otaku old-school, but the first<br />
generation, where sprites were an afterthought<br />
and the novahot technos were slinging complex<br />
forms that no mundane code could keep up with.<br />
That’s what this stream is all about. They can<br />
thread harder, faster, and sustain more forms at<br />
once than their peers. Even worse, when they get<br />
to their Hyperthreading ability, I’m not sure even<br />
the best hardware and the best mind on this rock<br />
could match one of these freaks in sheer hacking<br />
ability. The only thing I can think of off the top<br />
of my head that might (key word: might) be able<br />
to outhack them is one of the abominations that<br />
technoshamans can summon, but that’s for the<br />
next section.<br />
Kyle Jones (Order #16164256)<br />
86 DATA STREAMS >>
Could you leave off the editorializing? Every time you say<br />
something like ‘abomination,’ I get worried you’re about<br />
to post your manifesto.<br />
> Glitch<br />
> To be honest, this is an excerpt from it. I could share the<br />
entire thing if you like.<br />
> Clockwork<br />
> No.<br />
> Glitch<br />
> It always helps to remember that Clockwork is acting as<br />
his own hype man for the tunes he’s trying to mix. In other<br />
words, see hyperbole for what it is.<br />
> Pistons<br />
If you have to start slinging code against one,<br />
I suggest putting them in a situation where they<br />
need to rely on sprites, or GOD is about to converge.<br />
That should counteract most of their cheats.<br />
And hey, even if the second case doesn’t solve<br />
your problems directly, there’s always the chance<br />
they’ll piss GOD off enough that an Avenging Angel<br />
gets sent in to blow the fragger to bits. Just<br />
make sure you aren’t in the same zip code as them<br />
when that happens. Of course, that’s only if you<br />
have to start slinging code. Ideally, you should just<br />
shoot them. Doesn’t matter how good a Sourcerer<br />
is, they still can’t hack a piece of copper-jacketed<br />
lead moving at nine hundred meters per second.<br />
TECHNOSHAMANS<br />
In case the name didn’t clue you in, this stream<br />
takes a more spiritual approach to technomancy.<br />
They may not be as good with complex forms<br />
as Sourcerers, but what they bring to the table is<br />
somehow more horrifying. Anyone who’s dealt<br />
with technomancers since the <strong>Matrix</strong> overhaul<br />
knows how bulldrek sprites are, and Technoshamans<br />
double down on that. They almost always<br />
have at least one of the awful things around, and<br />
most likely will have far more than that. And of<br />
course, because there is a God, and He hates me,<br />
every single fragging Technoshaman having a literal<br />
army of sprites isn’t even the most terrifying<br />
thing about them!<br />
No, the most terrifying thing about Technoshamans<br />
would have to be great form sprites. I<br />
… I don’t know how to describe their capabilities<br />
in the usual sterile manner, so instead I’m going<br />
to tell you a little story. A while back, I was on<br />
a run trying to steal a prototype weapon from<br />
an Ares lab. The complication? There was another<br />
team of runners trying to steal the same<br />
gun. Anyway, I was trying to hack into the lab’s<br />
host, see if I could get their gun turrets to turn<br />
on the lab security. Anyway, in waltzes the Technoshaman,<br />
plain as day, his persona appearing<br />
as this ugly humanoid thing made entirely out<br />
of feathers. Fragger looked out at the army of<br />
Black IC and spoke a few words in a language<br />
that was old when the stars were new. (I didn’t<br />
hear enough to be sure, but I think it might<br />
have been COBOL.) Anyway, whatever it was,<br />
the thing it brought forth … I’ll never forget it.<br />
A giant crow of silicon and fiber-optics, large<br />
enough that, if there were a sun inside the <strong>Matrix</strong>,<br />
it would have blotted it out. Then, with a<br />
flap of its wing, the ghostdammed thing blew<br />
down the entire host. That’s a Technoshaman.<br />
That’s what they do.<br />
> That’s really poetic. I’m kinda surprised to see something<br />
like that on here at all, especially coming from you.<br />
> Red<br />
> I’m not being poetic. That is literally what happened. It<br />
took the host of a top-secret Ares lab down in the time it<br />
takes someone in meatspace to blink.<br />
> Clockwork<br />
KILL CODE What? Taking down a host is impossible. I’d put money on<br />
it.<br />
> /dev/grrl<br />
> I’m just telling you what I saw. I don’t know how I can<br />
make it any clearer. Sourcerers? Machinists? I can handle<br />
them. Technoshamans? They scare me.<br />
> Clockwork<br />
MACHINISTS<br />
Since I’m fairly certain everyone here needs a<br />
break from the terrifying realization that there<br />
are toasterfuckers out there who can take down<br />
hosts with a wave of their hand, let’s switch to a<br />
happier subject. Machinists! The worst they can<br />
do is kill you. Machinists aren’t as good with complex<br />
forms as Sourcerers, and they can’t summon<br />
sprites the way a Technoshaman can, but what<br />
they can do is hijack your rotodrones and have<br />
them give you a terminal case of lead poisoning.<br />
Their hacking abilities are mild at best, but even<br />
if your devices are secure enough that they can’t<br />
get at your drones, they usually come with several<br />
of their own. Think of them as riggers who<br />
happen to hack on occasion, like if I had an army<br />
of evil twins or something.<br />
Anyway, when fighting them, expect the kind<br />
of threats you’d usually expect from a rigger. You<br />
could be up against anything from weather balloons<br />
with chameleon coating and sniper rifles<br />
to a NeoNET Juggernaut coated with so much armor<br />
that the only ways to defeat it are to go to the<br />
nearest IJN base and see if they’ll let you borrow a<br />
battlecruiser, or to go up a flight of stairs.<br />
> Are you speaking from experience here?<br />
> Rigger X<br />
> Suffice to say it was the worst investment I’ve ever made.<br />
The armor plate alone set me back thousands. Five runs<br />
later and I’m still in the red.<br />
> Clockwork<br />
CYBERADEPTS<br />
To finish this all off, we have what are simultaneously<br />
the most and least terrifying of the various<br />
techno breeds: Cyberadepts. The name’s probably<br />
already given away what it is they do. Somehow,<br />
they manage to deal with cyberware in a<br />
way most technomancers can’t. This might not<br />
seem like a big deal until you see a novacoked-up<br />
Kyle Jones (Order #16164256)<br />
88 DATA STREAMS >>
KILL CODE Shame it leaves such a mess, though. I was picking bits<br />
of cyberskull out of my fender for days after the last time I<br />
did that.<br />
> Rigger X<br />
> There’s professional cleaner services you can get to deal<br />
with that kind of thing, no questions asked. They cost a<br />
mint, but it’s worth every nuyen.<br />
> Clockwork<br />
One thing that should be noted is that unlike<br />
real adepts, they have no issues when it comes to<br />
working their witchcraft with guns. Whereas an<br />
actual adept can’t get a gun made into a weapon<br />
focus because reasons I don’t really understand<br />
(I’m a techie, not a professor of thaumatology), a<br />
cyberadept can and will use guns to do things that<br />
you wouldn’t believe. That guy I mentioned, with<br />
the magic cybereyes? He once ricocheted a bullet<br />
off an exposed nail in a wall to hit an Azzie cultist<br />
in the back without harming the cultist’s hostage. I<br />
saw it and I still have a hard time believing it.<br />
> I mean, I can do that too.<br />
> Kat o’ Nine Tales<br />
> Vids or it didn’t happen.<br />
> Clockwork<br />
NEW TECHNOMANCER<br />
QUALITIES:<br />
RESONANT STREAMS<br />
Aside from being extremely technical in nature,<br />
the Resonance’s constantly shifting nature makes<br />
it unpredictable and very malleable. This flow<br />
must be followed by any technomancer seeking<br />
to manipulate and control the Resonance. Some<br />
technomancers have found that identifying a<br />
path to power helps them to focus their abilities.<br />
These paths are called Streams. For all technomancers,<br />
there are several fundamental rules to<br />
streams that must be followed:<br />
• A technomancer cannot follow two streams<br />
simultaneously.<br />
• Players may amend previously created characters<br />
and retroactively purchase a stream.<br />
• Streams cost 20 Karma to purchase and are<br />
not subject to the double cost of qualities<br />
after creation.<br />
Daemons are a new type of bonus. Like their<br />
name suggests, these are autonomous processes<br />
that the technomancer learns to keep running<br />
always. Mechanically speaking, these are passive<br />
bonuses that affect a specific aspect of the<br />
character, giving them either a new power or an<br />
improvement to an existing power. Every stream<br />
has an associated Daemon, along with other benefits<br />
that help to provide the stream with flavor.<br />
The complex form listed with the stream becomes<br />
available for purchase by technomancers in that<br />
stream, but it is not automatically given to them.<br />
These complex forms are only available to technomancers<br />
in those particular streams.<br />
CYBERADEPTS<br />
One of the effects of the recent changes to the<br />
Resonance and the <strong>Matrix</strong> was the unexpected<br />
advent of what many are calling Cyberadepts.<br />
These are technomancers who have the uncanny<br />
ability to modify the way the Resonance interacts<br />
with cyberware.<br />
BENEFITS<br />
• All complex forms that affect cyberware<br />
are performed with 2 less Fading Value.<br />
• +2 dice pool bonus to Compiling and Decompiling<br />
Tests involving Fault and Companion<br />
sprites.<br />
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE<br />
IN THE FLOW<br />
There is no possible way to spend a higher portion of<br />
your life online than technomancers, because there<br />
is no percentage higher than one hundred. They<br />
have all the time in the world and a lot of individuality,<br />
so that results in a full range of approaches to interacting<br />
with the <strong>Matrix</strong>. This chapter covers some<br />
of the complex forms, sprites, qualities, and echoes<br />
that make technomancers distinct. Here, then, are<br />
ways for technomancers to show how they have become<br />
true individuals.<br />
COMPLEX FORMS<br />
Complex forms help technomancers make their<br />
mark on the <strong>Matrix</strong>, threading up the right tool at<br />
the right time. Here are a few more tools that, at<br />
some point in time, might be the right one.<br />
ARC FEEDBACK<br />
Target: Icon Duration: S FV: L – 2<br />
Arc Feedback grants the technomancer the ability<br />
to catch some of the energy of a successful attack<br />
against them and send it back toward the attacker.<br />
While a technomancer is sustaining this form,<br />
every time they receive <strong>Matrix</strong> damage—that is to<br />
say, damage remaining after any and all resistance<br />
rolls—they roll Software + Resonance [Level] v. Willpower<br />
+ Firewall of the attacker. If the test succeeds,<br />
the damage the technomancer was not able to resist<br />
is reflected back to the attacker at a ratio of 1 point of<br />
damage for every 2 inflicted on the technomancer.<br />
Net hits on the test increase the damage, and the total<br />
damage must be resisted by the original attacker.<br />
Damage reflected back on the attacker does not reduce<br />
the damage taken by the technomancer.<br />
BOOTLEG PROGRAM<br />
Target: Device Duration: I FV: L – 2<br />
Target a device and make an opposed Software<br />
+ Resonance [Level] vs. Willpower + Firewall test.<br />
On a successful test, the technomancer may copy<br />
the effects of one program currently running on the<br />
device for a number of combat turns equal to the<br />
number of net hits.<br />
This complex form may not copy an agent or a<br />
program the technomancer already knows as a Resonance<br />
[program] echo (p. 258, SR5). A technomancer<br />
may only benefir from one Bootleg Program at a time;<br />
threading a new Bootleg Program complex form cancels<br />
any remaing effects of the previous one.<br />
HOST EMULATOR<br />
Target: Self Duration: P FV: L<br />
Sometimes the target needs to believe that<br />
they’re in a regular host doing typical things when<br />
a runner needs that target to be doing anything but<br />
that. And sometimes a little illusion is all you need<br />
to log a target’s keystrokes or get their banking<br />
PINs. Whatever it is, it’s always better to have a host<br />
emulator in your back pocket, just in case.<br />
When threading the Host Emulator complex<br />
form, a technomancer makes a Software + Resonance<br />
[Level] simple test. They create a host that<br />
looks legitimate, but is not, though the pseudo-host<br />
does appear to have been created through official<br />
channels. This pseudo-host seems functional but<br />
does not store any data and cannot make or run IC.<br />
The technomancer may attempt to make the<br />
pseudo-host appear to be a host that already exists,<br />
if they have at least one mark on that host<br />
when this complex form is threaded. Anyone<br />
entering it may realize it’s not a real host by performing<br />
a <strong>Matrix</strong> Perception test, with a threshold<br />
equal to the number of hits rolled when threading<br />
this complex form.<br />
In the event that someone attempts to hack the<br />
host, treat the pseudo-host’s rating as (2 x number<br />
of hits on the threading test). If the hack is successful,<br />
the hacker gets marks on the technomancer<br />
and sees through the illusion.<br />
Kyle Jones (Order #16164256)<br />
94 IN THE FLOW >>
This complex form may be dismissed by the<br />
technomancer as a Simple Action.<br />
MIRRORED PERSONA<br />
Target: Self Duration: I FV: L – 2<br />
You can create a proxy persona that looks and<br />
acts identical to you in the <strong>Matrix</strong>. To differentiate<br />
between the technomancer and the proxy, opponents<br />
must succeed on a <strong>Matrix</strong> Perception test<br />
with a threshold of the number of hits rolled when<br />
threading this form.<br />
If they fail to notice, opponents target the proxy<br />
with a <strong>Matrix</strong> Action. The player rolls a defense test<br />
as normal. If they succeed, the proxy disappears,<br />
and technomancer character takes no negative effect.<br />
PINCH<br />
Target: Self Duration: S FV: L + 2<br />
When you’re caught in the crossfire, sometimes<br />
the only thing to do is burn down everything<br />
around you.<br />
If a technomancer is sustaining this form when<br />
their <strong>Matrix</strong> condition monitor becomes full or<br />
when they are otherwise forcibly removed from<br />
the <strong>Matrix</strong>, all icons the technomancer has marks<br />
on and all icons that have marks on the technomancer<br />
take <strong>Matrix</strong> damage equal to the level of<br />
the complex form. This damage may be resisted.<br />
If a technomancer is removed by the fade damage<br />
from threading this form, the form fizzles and<br />
returns to the fabric of the Resonance before it can<br />
take effect.<br />
PRIMED CHARGE<br />
Target: Self Duration: I FV: L<br />
When a technomancer harnesses the raw power<br />
of the Resonance, it can make any obstacle that<br />
gets in their way regret its choices.<br />
Make a Software + Resonance [Level] test. The<br />
next <strong>Matrix</strong> action you perform gains a dice pool<br />
bonus equal to the number of hits on this test.<br />
RESONANCE BIND<br />
Target: Persona Duration: S FV: L – 2<br />
Need to slow the opposition down? Snag<br />
them in a Resonance Bind that hinders all actions<br />
in the <strong>Matrix</strong>.<br />
Make a Software + Resonance [Level] v. Intuition<br />
+ Data Processing opposed test. On a successful<br />
attack, each net hit reduces the target’s Initiative<br />
Score by 2. If you sustain the complex form,<br />
the target loses the same amount from their Initiative<br />
Score at the beginning of each combat turn.<br />
A target caught in Resonance Bind may attempt<br />
to break free of the binding by making a<br />
Cybercombat + Logic [Attack/Sleaze] v. the complex<br />
form’s Level x 2 opposed test. Success only<br />
means that they stop future Initiative Score loss;<br />
they do not regain any points of Initiative Score in<br />
the present Combat Turn.<br />
RESONANCE CACHE<br />
Target: IC Duration: I FV: L – 2<br />
The technomancer pushes a single IC into a<br />
stream of Resonance that isolates it, effectively locking<br />
it away. Make a Software + Resonance [Level] v.<br />
Host Rating x 2 opposed test. On a successful test,<br />
the IC is locked in a Resonance fold for a number of<br />
combat turns equal to the complex form’s level.<br />
SEARCH HISTORY<br />
Target: Device Duration: I FV: L – 2<br />
Target a device and make a Software + Resonance<br />
[Level] v. Device Rating x 2 opposed test.<br />
On a successful test, the technomancer has a full<br />
record of the device’s <strong>Matrix</strong> history over a number<br />
of days past equal to the number of net hits.<br />
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE ><br />
Kyle Jones (Order #16164256)
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE<br />
A MILLION<br />
ICONS BLOOM<br />
POSTED BY: DEMONSEED ELITE<br />
Techomancers have one core thing in common.<br />
Beyond that, we have plenty of differences, and<br />
like any such people, we can’t resist the appeal of<br />
associating with those who are different, so long<br />
as their differences are like ours. Here, then, are<br />
some notes about the virtual tribes of the Sixth<br />
World, where technomancers can gather with others<br />
who share their talent and inclinations—and<br />
how to make themselves distinct from the other<br />
people who are sort of like them, but not really.<br />
WHAT IS A<br />
VIRTUAL TRIBE?<br />
When technomancers get together and work<br />
closely for a time, bonds form within the group.<br />
That bond makes it easier to get in touch with<br />
the Resonance, and it can help groups of technomancers<br />
get in touch with Paragons, entities of<br />
the Deep Resonance that can guide them.<br />
Not all tribes are focused on hacking. Many<br />
technomancers were not hackers when they felt<br />
the Resonance for the first time. Most technomancers<br />
eventually do learn to hack, both out of<br />
self-defense, and because hacking is just manipulating<br />
programs, which is easy when you can see<br />
the threads underneath the code.<br />
So, if you go looking for a tribe, you will find<br />
hackers — natch — but you will also find truck drivers,<br />
stuffer-shack counter-jockeys, mid-level managers,<br />
factory workers, and Lone Star beat-cops.<br />
Most of them use their varied backgrounds to help<br />
out their brothers and sisters. One technomancer,<br />
someone I have known for years, works a day job<br />
as a sushi chef in the cafeteria of one of the Japanacorps.<br />
They have never suspected her secret,<br />
mostly because she doesn’t hack while at work.<br />
It must be hard resisting the temptation, but she<br />
apparently manages to keep her work and home<br />
life separate.<br />
> Good advice for runners as well, if you bother having a<br />
day job.<br />
> Bull<br />
Knowing that your landlord, unemployed<br />
neighbor, barista, or hairdresser, could be a<br />
Technomancers who join a virtual tribe (otherwise known as a<br />
“submersion group”) gain some mechanical benefits.<br />
Submersion costs [10 + (new Submersion grade x 3)] are<br />
reduced by 10 percent (rounded down) to reflect the support<br />
of more experienced technomancers guiding and helping the<br />
technomancer who is undergoing submersion.<br />
The tribe counts as a group contact and can often source<br />
equipment or chemicals, the real-world substances that can help<br />
build materials to access the virtual.<br />
The tribe also counts as having a tutor for Resonance skills and<br />
abilities.<br />
Some tribes also have a paragon mentor. Joining a mentored<br />
SUBMERSION GROUPS<br />
tribe gives all the benefits and drawbacks of having that paragon<br />
for as long as the technomancer is a member.<br />
Each virtual tribe may have one or more strictures that it follows<br />
(see p. 110).<br />
Leaving a submersion group voluntarily takes an hour of work<br />
with at least two members. Ejecting a member involuntarily requires<br />
an hour of work from at least half of the remaining members.<br />
Members of a group are bound together by the Resonance;<br />
when connected to the <strong>Matrix</strong>, or in any of the Resonance realms,<br />
technomancers who can see the icon of another member in the<br />
<strong>Matrix</strong> can tell with a <strong>Matrix</strong> Perception test if the member is in<br />
compliance with the group’s strictures.<br />
Kyle Jones (Order #16164256)<br />
106 A MILLION ICONS BLOOM >>
technomancer causes angst for people who already<br />
fear technomancers … we could be literally<br />
anywhere.<br />
We aren’t everywhere.<br />
We are, in fact, hardly anywhere. Whatever created<br />
technomancers never exactly made many of<br />
us, and then we’ve had purges and persecutions.<br />
It’s a wonder there are any of us left, but there do<br />
seem to be a few more every year.<br />
> Sure, “There are hardly any of us.” That’s just what they<br />
want you to think.<br />
> Plan 9<br />
HOW TO GET IN<br />
TOUCH WITH AN<br />
EXISTING TRIBE<br />
Paranoia makes technomancer tribes hard to<br />
find. Technomancers have been chased and persecuted<br />
for years now, and groups who support<br />
technomancers openly have been stomped on<br />
by megacorps, or infiltrated by corporate intel<br />
teams, so that any technomancers a group is in<br />
contact with can be tracked down and disappeared<br />
into research labs.<br />
It’s not so much that tribes have gone to<br />
ground; more that the ones that survived never<br />
left the ground in the first place. This makes it<br />
hard to hook up with new groups, but not impossible.<br />
Some tribes seek out technomancers and<br />
try to give them a hand to survive. If you are really<br />
lucky, when you first emerge and are too n00b<br />
to properly protect yourself, one of these groups<br />
will find you, and you’ll be able to join right off<br />
the bat. New technomancers tend to act in predictable<br />
ways in the Resonance, and if another<br />
technomancer is around, they will notice that<br />
someone is resonant. Deckers might not notice a<br />
new technomancer, assuming it’s some kid with<br />
a cheap deck, but another technomancer will. As<br />
long as the experienced technomancer is not a<br />
heartless sellout, they will at least send a message<br />
around that there is a new technomancer,<br />
and most will hang around for a while to protect<br />
the fledgling until they can fly. It may not last for<br />
long, it’s not like we ain’t got shit to do. It might<br />
even be that a sympathetic virtual tribe doesn’t<br />
get the message, or doesn’t have the resources<br />
to help. Sucks to be the fledgling, but the majority<br />
of technomancers didn’t get help to start with, so<br />
newbies have the same chance that most of us<br />
have had.<br />
> How many have you kept from metaphorically walking<br />
into traffic, Netcat?<br />
> 2XL<br />
> Enough. Some have made me sorry that I did.<br />
> Netcat<br />
If you aren’t one of the lucky ones who got a<br />
tribe in your soy-flakes, you have to go looking.<br />
Finding technomancers is tricky, but not impossible,<br />
and when you find technomancers, there are<br />
pretty good odds that one will be in a tribe. Thing<br />
is, you have to go looking in places on the <strong>Matrix</strong><br />
where you think technomancers might hang<br />
out, which is where everyone else thinks technomancers<br />
hang out, including technomancer hunters.<br />
Those are the worst places to be if you are a<br />
technomancer.<br />
The easiest way to find a tribe is to do your research.<br />
You’re a fragging wizard on the <strong>Matrix</strong>, so<br />
act like it, omae! Information about virtual tribes is<br />
around in posts like this one, deep in the <strong>Matrix</strong>,<br />
hidden in protected message boards. Once you<br />
know about a tribe, you can make a guess about<br />
how to contact it. When you think you’ve found a<br />
host where the tribe you hope to join is hanging<br />
out, the best way to extend a greeting is to send in<br />
a sprite with a message.<br />
KILL CODE It must be nice to have some backup—the closest I have to<br />
a bunch of droogs is you lot.<br />
> Glitch<br />
> It must be nice not to have people hunting you down for<br />
something you can’t control.<br />
> Respec<br />
> Well … any more than runners normally get hunted down.<br />
> Puck<br />
Hey, I get it, you’re flush with Resonance and<br />
enjoying your own power! Why should you join<br />
with those technomancer losers when you could<br />
have a totally rad gang of virtual adepts of your<br />
own to boss around and make a splash? Why not?<br />
I say go for it—virtual tribes come from somewhere,<br />
maybe you’ll make it big.<br />
There isn’t a lot that you have to do to make your<br />
own tribe. You need to get together with some<br />
other technomancers (and maybe free sprites)<br />
and then promise that you’ll watch one another’s<br />
backs. That’s it. If you want to do some funky Resonance<br />
stuff as a group, there are a couple more<br />
Kyle Jones (Order #16164256)<br />
108 A MILLION ICONS BLOOM >>
KILL CODE This just looks like putting together a crew, how hard is<br />
that?<br />
> Marcos<br />
> Easy for you, you’re an experienced gun-runner. It’s a lot<br />
harder for some of us.<br />
> Hannibelle<br />
> There are a few of us who don’t get on that well with other<br />
people. It goes against our grain.<br />
> Cayman<br />
KILL CODE Wait, so there are buckets of rules for people to follow?<br />
What’s the point? Isn’t the <strong>Matrix</strong> all about freedom and<br />
doing whatever the hell you want?<br />
> Tolstoi<br />
> You are free to join the group or not, but like many social<br />
groups, there are rules, and if you break the rules you get<br />
kicked out. That’s true for technomancers as much as for<br />
anarchists like you.<br />
> /dev/grrl<br />
ATTENDANCE<br />
The group meets on a regular basis; each member<br />
must attend at least 75 percent of the scheduled<br />
meetings or they have broken this stricture. No<br />
one likes tribe mates who never come on raids.<br />
CHARITY<br />
GROUP STRICTURES<br />
A virtual tribe can choose rules that each of the members<br />
must adhere to. Breaking a stricture means that the member<br />
is no longer a part of the group until they apologize and make<br />
it up in some way. This can cause a group to dissolve entirely<br />
if there is only one person (or even no people) who have kept<br />
the rules.<br />
A technomancer who breaks one or more group strictures<br />
increases all Fading Values by one for each broken stricture,<br />
for every Resonance action that involves Fading, until the<br />
technomancer earns forgiveness from the rest of the tribe.<br />
The list of strictures in this chapter is not exhaustive; any<br />
clear behavior can become a stricture with approval from the<br />
gamemaster.<br />
The group is focused on white-hat activities. Each<br />
member is expected to contribute time, money,<br />
goods, or expertise to people who need it. The<br />
stricture is held if the technomancer has completed<br />
at least one act of charity in the past month;<br />
otherwise, it’s broken.<br />
CORRECTION<br />
A tribe that chooses this believes that they have a<br />
duty to correct wrong information when they find<br />
it. There is a limit to the amount of correction that<br />
a technomancer can complete in a day, so a technomancer<br />
is not expected to correct every scrap<br />
of information they come across. Where the member<br />
can correct a significant piece of information,<br />
but chooses not to, they violate the stricture.<br />
> I’d be surprised if anyone wrote “Grammer Pedant” into<br />
the rules of their little technomancer group.<br />
> Riot<br />
> That’s “Grammar Pedant” to you.<br />
> /dev/grrl<br />
DEED<br />
The tribe needs something done, usually of significant<br />
size. Every couple of months, the members<br />
are expected to spend anywhere from half<br />
a day to most of a week working on a significant<br />
task for the group. Often this involves hacking<br />
someone big.<br />
DEFENDER<br />
A tribe choosing this stricture believes in protecting<br />
fellow technomancers. These technomancers<br />
are often the ones who answer the call when<br />
someone puts out the word for a flash tribe. A<br />
member who refuses a call for help violates this<br />
stricture. This doesn’t apply to dissonant technomancers<br />
or to technomancers who have a reputation<br />
for betraying their own.<br />
In effect, a technomancer can safely turn<br />
down a request for aid from any technomancer<br />
who has notoriety.<br />
DUES<br />
Some tribes choose to maintain a private host<br />
or some other facility for members, and these<br />
cost money. Members of the tribe are expected<br />
to make a regular contribution. In place of actual<br />
cash, hacking a secure host for the tribe’s exclusive<br />
use will also fulfill the stricture for as long as<br />
the host is available.<br />
Kyle Jones (Order #16164256)<br />
110 A MILLION ICONS BLOOM >>
KILL CODE Look, the names these things have sound like they were<br />
given by the stodgiest bland wage-slave. You can guarantee<br />
they are not given names like this in any technomancer<br />
group. We’ve just grouped them together and removed the<br />
funky names so that we can talk about them.<br />
> Netcat<br />
PARAGONS<br />
IN TRIBES<br />
Paragons (see p. 102) sometimes adopt tribes<br />
for their own inscrutable reasons. Presumably<br />
PARAGON TRIBAL BENEFITS<br />
In addition to the personal paragon benefits listed on p.<br />
103, the paragon reduces noise between members of the tribe.<br />
When connecting to, or using a <strong>Matrix</strong> or Resonance action on<br />
a teammate, the noise penalty for distance is halved, as is the<br />
penalty for being in a spam or static zone.<br />
Adding a paragon is a Resonance action that requires the<br />
entire tribe to be present in one <strong>Matrix</strong> location and takes an<br />
hour for each member of the tribe.<br />
Removing a paragon requires a majority of the tribe to agree,<br />
and at least half the tribe to be present. The technomancers<br />
present don’t necessarily all need to be the ones who agree to<br />
remove the paragon. The action takes one hour, plus one hour<br />
for each member of the tribe who is not present.<br />
A tribe may not have more than one paragon at a time.<br />
Whether and when a paragon decides to abandon a tribe<br />
is a call for the gamemaster. In general, a tribe should have<br />
several warnings and opportunities to reform before a paragon<br />
severs the relationship. Similarly, convincing a paragon who<br />
has left to return will require some sort of solid proof that the<br />
tribe has changed its ways, “We promise to do better next time”<br />
will never cut it.<br />
the paragon gets something out of the arrangement<br />
by helping tribes that have similar goals. For<br />
whatever the reason, it’s possible to ask a paragon<br />
to help the tribe out. Tribes are also occasionally<br />
approached by paragons for a mutually<br />
beneficial relationship. When you belong to a<br />
tribe that has a paragon as a patron, you gain all<br />
the benefits and drawbacks of having the paragon<br />
as a personal friend. If you already have a<br />
paragon that you have a special relationship with,<br />
it doesn’t keep you out of the tribe, but you only<br />
get the benefits from your friend; you don’t get<br />
the benefit of the tribal paragon.<br />
One additional benefit a paragon gives is that<br />
it is easier for tribemates to communicate with<br />
each other. Perhaps the paragon smooths the<br />
way for the signal between its helpers, or maybe<br />
it gently molds the communication style of the<br />
tribe in such a way that it is easier to sync. Either<br />
way, talking with your tribemates becomes just<br />
that little bit easier.<br />
> Are these like mentor spirits for mages? Because they<br />
sound like mentor spirits for mages.<br />
> Frosty<br />
KILL CODE While they may look similar, mages and shamans call<br />
on ancient archetypes and spirits, established and<br />
traditional mentors, beyond the ken of our knowledge.<br />
As far as I can see, paragons just popped up a couple<br />
of years ago, and sometimes look different to different<br />
people. Not at all alike.<br />
> Winterhawk<br />
> Sure, and where did the mentor spirits come from<br />
originally? Your explanation sounds good, but I ain’t<br />
buying it.<br />
> Haze<br />
One issue that sometimes comes up is that<br />
paragons and tribes often have similar but<br />
non-identical goals, and occasionally the paragon<br />
tries to push the tribe down the path it wants,<br />
rather than the path the technomancers thought<br />
they wanted. Luckily, technomancers don’t often<br />
see the paragon as infallible, so they can take or<br />
leave advice, and this reduces the influence of a<br />
paragon. Of course, technomancer tribes themselves<br />
are fairly mercurial, and may well decide<br />
to follow their paragon and amend the goals of<br />
the group. They are also able to part ways with a<br />
paragon on friendly terms.<br />
To make things more complicated, sometimes<br />
paragons push for actions that the tribe doesn’t<br />
want, but afterward it turns out to be what they<br />
needed. Many tribes get it wrong, but most paragons<br />
and tribes find they have common ground,<br />
even after large and loud arguments.<br />
Parting ways with a paragon involves using the<br />
Resonance bond that the group shares to unpick<br />
the agreement with the paragon. This is not a<br />
complicated task, but it can take a while to separate<br />
the threads that connect the paragon to the<br />
tribe. A majority of the tribe must agree to parting<br />
ways with the paragon, and at least half the tribe<br />
need to be together in a single <strong>Matrix</strong> location.<br />
Adding a new paragon is also not difficult. This<br />
requires the entire tribe to be in one place and<br />
meet the paragon. The paragon might require that<br />
the tribe entreat or beg for it to join, or it might see<br />
the arrangement as a simple contract, or even just<br />
as a request to hang out. In any case, it will still<br />
take a while for everyone to make introductions.<br />
If the tribe wants to move on from their old paragon,<br />
and have found another to go to, they must<br />
remove their old one before adding the new one.<br />
Paragons can also ditch tribes that they think<br />
are not holding up their end of the agreement.<br />
Normally there will be a long process where the<br />
paragon complains about the actions of the tribe<br />
before it goes.<br />
It’s also possible to establish contact with a paragon<br />
who has broken off an agreement with the tribe,<br />
but you need to do a lot of belly-crawling to get back<br />
into the good books for something like that.<br />
AI IN TRIBES<br />
> This terrifies me.<br />
> Sounder<br />
They aren’t necessarily a natural fit, but some<br />
technomancers offer a hand to AIs, those other<br />
children of the <strong>Matrix</strong>. Artificial intelligences don’t<br />
get the Resonance benefits of being in a tribe, but<br />
many of them are eager to be a part of a relatively<br />
trustworthy group of people who share time on<br />
the <strong>Matrix</strong>.<br />
In many ways, AIs complement technomancers<br />
well. AIs can do several things that technomancers<br />
can’t, especially the way they can interact with devices<br />
using their depth. The technomancers bring<br />
the ability to access the Resonance realms and<br />
sprites, things that AIs can barely understand, let<br />
alone attempt.<br />
In any case, depending on how much the AI<br />
and the tribe trust each other, the home host of an<br />
AI can be an ideal place for a tribe to meet. If the<br />
AI isn’t quite that trusting, their ability to manipulate<br />
ownership of devices is still an excellent way<br />
to get a safer and more secure home for the tribe<br />
and can cut down on the <strong>Matrix</strong> profile of many of<br />
their members.<br />
AIs also often seem to be interested in sprites<br />
as a curiosity, and some even attempt to study<br />
them in order to find out whether an AI is a distant<br />
cousin of a sprite, or whether they are different<br />
constructs entirely. Little progress has been made.<br />
Sprites don’t seem to mind the attention, but most<br />
do not have any interest in studying the other way.<br />
AIs can be very effective advisors as well, but<br />
like anyone (other tribe members included) they<br />
have their own goals, and care must be taken that<br />
the tribe doesn’t become a pawn in some larger<br />
power play that the AI is involved in.<br />
Naive AIs also have a history of abuse, and<br />
some of those doing the abusing have been technomancer<br />
tribes. When someone easily led and<br />
eager to help is in your group, there are many<br />
Kyle Jones (Order #16164256)<br />
112 A MILLION ICONS BLOOM >>
KILL CODE I’m still terrified.<br />
> Sounder<br />
VIRTUAL TRIBES<br />
AS CONTACTS<br />
Sometimes you might have made a friend of a<br />
technomancer, and he might introduce you to his<br />
friends. Virtual tribes are not very trusting, but if<br />
you help out the whole tribe, you can get a group<br />
of friends you can rely on. Having a whole tribe<br />
as a friend is not as reliable as having one individual<br />
person, since the people you helped out may<br />
not be the ones who pick up the phone. Even so,<br />
it is nice to know a group of incredible hackers. If<br />
you continue to help them out with small tasks—<br />
normally things that cannot be done from the<br />
<strong>Matrix</strong>—they will be able to help you out in the<br />
<strong>Matrix</strong>.<br />
Virtual tribes excel at being an information<br />
clearing house—they are better as a group than<br />
any individual hacker is. If you are friends with a<br />
group, they will be happy to share juicy gossip<br />
with you. Specific paydata—such as the building<br />
layout for the Aztec pyramid, or the name of the<br />
lead scientist on the Evo jump-pack project—will<br />
cost you, but you can expect mates-rates. Generally,<br />
they will have already built in their best discount,<br />
so negotiating probably won’t work, and<br />
you might even offend your friends by being hardnosed<br />
on money.<br />
Virtual tribes collect information about their<br />
central cause, but are also good sources of information<br />
about the <strong>Matrix</strong> generally, about movers<br />
and shakers in the area, about BTLs and skillsofts.<br />
Tribes are also uniquely good at examining very<br />
large amounts of bland information and coming<br />
up with patterns and root causes. So if you ask<br />
them to look at arrest records, public shipping<br />
manifests, and disease statistics, they may come<br />
back and say that two DocWagon crews are smuggling<br />
medical supplies to three particular gangs on<br />
the edge of the Redmond barrens, just from looking<br />
at all the information and picking out patterns.<br />
FAVORS THAT VIRTUAL<br />
TRIBES APPRECIATE<br />
Virtual tribes don’t have access to everything. When looking<br />
to help a tribe out, there are a variety of things that you can do<br />
that would make things easier for them. The small selection<br />
below should be taken as a starting point.<br />
1. Looking up information in a paper-based library<br />
2. Repairing broken drones<br />
3. Social engineering passwords<br />
4. Being the muscle in a show of intimidation<br />
5. Letting someone hide out at your place<br />
6. Looking after the body of someone on a Resonance quest<br />
> I’ve worked for worse. Normal rules apply—don’t trust the<br />
Johnson if it’s more valuable for them to screw you over.<br />
> Bull<br />
> They don’t sound like they would know what they are<br />
doing, which is not good. The bullets I’ve taken are usually<br />
because I’ve worked for green Mr. Johnsons who didn’t<br />
know what they were doing.<br />
> 2XL<br />
> Yeah, they are a mixed bag, but no one is going to be as<br />
on top of it as an experienced corporate Johnson. Unless<br />
you’re working for a mega, Mr. Johnson is going to need<br />
some hand-holding. That applies to these tribes<br />
> Bull<br />
SAMPLE TRIBES<br />
REPLANTING THE TREE<br />
Talk about your secretive groups—the virtual tribe<br />
referred to as “Replanting the Tree” goes to extreme<br />
lengths to stay secret, hidden even from<br />
other technomancers. I don’t know who their<br />
leader is, and I think that they actually meet in<br />
meatspace to advance whatever shadowy goals<br />
they have. The group has been around a long<br />
time, and it doesn’t look like they are taking many<br />
signups. I possess some facts and rumors, and<br />
they clearly are up to something. Other technomancers<br />
have encountered mysterious and hostile<br />
Replanters in the Deep Resonance realms,<br />
apparently looking for something or trying to<br />
build something. Members thought to have been<br />
with the tribe seem focused on Seattle, especially<br />
KILL CODE Wait, they want to “Replant the Tree”? That will not stand.<br />
> Axis Mundi<br />
> There is a big difference between wanting to and being<br />
able to.<br />
> The Smiling Bandit<br />
> What are you old bastards talking about?<br />
> Turbo Bunny<br />
> I’ll send you some archived files.<br />
> The Smiling Bandit<br />
SUMMER_KNIGHTS<br />
It’s a hard world, and some people want to do<br />
their best for the people they know, protecting<br />
them against the horrors beyond their little gate.<br />
Even non-technomancers. Hey, deep in the Resonance<br />
there could be all kinds of crap that people<br />
don’t know about. Also, technomancers, like<br />
shadowrunners, see a lot of drek that doesn’t<br />
make it to the newscasts. A hell of a lot of the<br />
time it’s not profitable for a corporation to protect<br />
people, so sometimes technomancers have<br />
to be the unsung heroes of the wilderness. As<br />
you can imagine, protecting non-technomancers<br />
is not a very common viewpoint, but the Summer_Knights,<br />
led by ALT-Halus, go out and do<br />
just that.<br />
The Summer_Knights are mostly made up of<br />
people who never thought they would become<br />
technomancers, and the group as a whole is more<br />
about ears on the street than deep-diving into the<br />
Resonance. As a result, they tend to make a difference<br />
on a local level. They can pick up when<br />
someone is being attacked in the <strong>Matrix</strong> and assist,<br />
but they can also coordinate people around<br />
the world to make small gestures that mean a lot<br />
to people. When paperwork gets lost in the bow-<br />
Kyle Jones (Order #16164256)<br />
114 A MILLION ICONS BLOOM >>
KILL CODE So, they like to do good things, but really little good<br />
things?<br />
> Winterhawk<br />
> Yeah, they are pretty low-key, haven’t heard much about<br />
them, but maybe that’s the way to stay alive? Ooooooor<br />
maaaybe they are subtly building up a large subnet of<br />
favors and influence at all levels of society, so that when<br />
they make their big play, everyone who owes them will<br />
keep it secret. Maybe they have already done it! I need to<br />
check a few things …<br />
> Snopes<br />
TECHNORIGGERS<br />
The <strong>Matrix</strong> is made up of all kinds of devices. Vehicles<br />
and drones have had riggers since the <strong>Matrix</strong><br />
1.0 and will probably have riggers for many<br />
years to come. As we are a part of this milieu of<br />
devices, servers, nodes and drones, some of us<br />
naturally gravitate toward vehicles as well. There<br />
is a lot to be said for abandoning the flesh but still<br />
remaining a part of the physical world. The Virtual<br />
Racers want to support and encourage technomancers<br />
to embrace the physical world in shells<br />
of metal and plastic. The Virtual Racers seem to<br />
have lost one of their influential members lately,<br />
and there are crazy, spontaneous drone races<br />
happening all across the world, which look like<br />
they could be a shaking down of the pecking order.<br />
It’ll settle down soon as someone, or someones,<br />
step up to lead the group, but for now it’s<br />
fun to watch cleaning drones down their mops<br />
and skip along wet soapy corridors. My favorites<br />
SUMMER_KNIGHTS<br />
Estimated Membership: 12<br />
Headquarters: Cleveland, UCAS<br />
Membership Requirements: A stricter-than-normal evaluation<br />
period, during which members of the group will observe<br />
the potential recruit for months to evaluate whether they<br />
suit the group.<br />
Strictures: Attendance, Oath, Defender<br />
Customs: Deed, Secrecy<br />
Resources: Medium<br />
Dues: Medium<br />
Patron: Alt-Halus<br />
Paragon: None<br />
Membership Benefits: The good feeling that you get for<br />
supporting a group that makes a change in the lives of a<br />
tiny number of people.<br />
Dominant Stream: Technoshamans<br />
Roles for Non-Technomancers: None<br />
Contact Benefits: Alerting the group to areas that they can<br />
help in will earn a small reward. Actively helping the group<br />
with tasks will result in loyal friends.<br />
TECHNORIGGERS<br />
Estimated Membership: 40–60<br />
Headquarters: Austin, Texas<br />
Membership Requirements: No formal requirements<br />
Strictures: Deed (Have a great race!)<br />
Customs: Gossip<br />
Resources: Medium<br />
Dues: Medium<br />
Patron: None<br />
Paragon: None<br />
Membership Benefits: A good source for rigging-based<br />
submersion techniques, they also have good contacts for<br />
buying and trading drones.<br />
Dominant Stream: Cyberadepts<br />
Roles for Non-Technomancers: Group is open only to<br />
technomancers. Normal riggers have their own clubs for<br />
this sort of thing, although there are more and more nontechnomancer<br />
fans around. AIs are welcome and can race<br />
the technomancers, but not in ladder races.<br />
Contact Benefits: Buying and selling drone hardware, and<br />
other vehicle-style benefits. Also, if you want to be taken<br />
on the ride of your life, you can ask them to take over your<br />
Ford Americar. Just be sure to have good insurance.<br />
KILL CODE That can’t be it. There are more groups than this around.<br />
> \dev\grrl<br />
> This is a sample to let you know what sort of things are<br />
out there. Groups are forming and dissolving all the<br />
time. Contact me off-board if you’re looking to make<br />
connections.<br />
> Demonseed Elite<br />
FLASH TRIBES<br />
Most of the time you hang out in your hacker<br />
pod, or dive apartment, cruising the <strong>Matrix</strong> alone<br />
and living by your wits, but sometimes you come<br />
across something that needs doing. Yeah, sometimes<br />
that’s “for the greater good,” but more often<br />
it’s taking down some bastard who needs taking<br />
down, or hacking some corp that is lazy about<br />
Kyle Jones (Order #16164256)<br />
116 A MILLION ICONS BLOOM >>
KILL CODE You know, I’ve been around one of these things when it’s<br />
all gone sideways. There was digital graffiti everywhere,<br />
avatars suddenly flipped between basic shop-bought<br />
ones and random creations from a costume shop.<br />
No one could do anything, and the rigger who was<br />
with me lost control of all of his drones. We killed the<br />
technomancer who set it off—it was pretty easy to spot<br />
the panicking person with no deck or ware. I think we<br />
did them a favor. Of course, that didn’t stop the ones<br />
who had turned up to party.<br />
> Red Anya<br />
IGNITING A FLASH<br />
There are two aspects to using flash tribes: calling the<br />
technomancers and guiding them. In many ways it’s not unlike<br />
calling a sprite with dozens of heads.<br />
Putting the word out can determine how many<br />
technomancers turn up, and it’s not like you get to turn people<br />
away, so there might be people there that you don’t expect.<br />
To determine how many people join a flash tribe, roll the<br />
number of dice determined by the table below and add up the<br />
total (rather than counting the number of hits).<br />
DETERMINING FLASH TRIBE NUMBERS<br />
CALLER<br />
MODIFIER<br />
Caller has a charisma of 5+ +1D6<br />
Caller has submerged +1D6<br />
Caller is a part of an existing tribe +1D6<br />
Caller gives more than ten minutes<br />
warning<br />
+1D6<br />
Caller gives less than a minute warning –2D6<br />
Caller has participated in a flash tribe in<br />
the past month<br />
+1D6<br />
After the people turn up, the caller has to maintain control<br />
of the tribe. This is Charisma + Leadership (number of dice<br />
rolled). If this roll is successful, the tribe adds teamwork dice<br />
to each Resonance test made by the caller and anyone else<br />
who is designated by the caller.<br />
If the roll fails, the technomancers run amok. This is an<br />
opportunity for roleplaying out a chaotic scenario. However, in<br />
the interest of keeping things simple, this can be modelled by<br />
adding noise equal to the number of technomancers who have<br />
turned up to everyone in the area.<br />
KILL CODE<br />
DIVING<br />
UNDER<br />
POSTED BY: RESPEC, BUT<br />
DEFINITELY NOT WRITTEN BY HER<br />
> Okay, so, I found this on the ‘link of someone who came<br />
after me. Defused a heck of a data bomb to get it. It looks<br />
like some sort of “protect yourself from technomancers”<br />
guide. Thought it might be good to help us understand<br />
how people think we might come at them, so we can<br />
respond appropriately. Also, we can have a few laughs.<br />
> Respec<br />
> Who would write something like this? Someone who has<br />
it in for technomancers?<br />
> Soldat<br />
> Could be someone with an axe to grind, Clockwork?<br />
> Netcat<br />
> Sh’yeah right. If I ever wrote something like this, I’d never<br />
admit it. Or share it with you people.<br />
> Clockwork<br />
HUNTING<br />
TECHNOMANCERS<br />
That title means two things. In one meaning, the<br />
first word is a verb, the second is an object. In<br />
the other, the first word is an adjective describing<br />
what the second word is doing.<br />
In either case, you have the challenge of avoiding<br />
someone who swims in the information currents<br />
of the <strong>Matrix</strong> like they are born in them.<br />
Because they were. They have a sense for the ever-present<br />
data flow that can help them either find<br />
what they are looking for quickly or disappear in<br />
the ocean of noise.<br />
What this means is that whatever sense of the<br />
term is being used, it’s trouble. If you’re dealing<br />
with technos, you need to know some of their<br />
habits and tendencies so you can close on them<br />
or get away from them, as situations require. Here<br />
are some tips that should help.<br />
NOTICING THAT<br />
YOU’RE BEING HUNTED<br />
It’s funny, this is the third time today that you’ve received<br />
a call from a telemarketer who knows your<br />
name, and how much money you have in your<br />
primary account. For a few weeks, pizza delivery<br />
drones have been delivering your food to the<br />
Humanis Policlub meetings down the block, and<br />
every time you login, you have to reset your icon<br />
to the default, because something keeps moving<br />
your virtual head to where your virtual ass is.<br />
If you see things like this, you may have a problem.<br />
You may have pissed off a hacker. No need to<br />
panic, though, since a typical decker can only get<br />
you when you’re online. Oh, your offline soy-oven<br />
is spitting out garlic-flavored orange juice? Your<br />
’link keeps setting its timezone to Tanzania? Yeah,<br />
you might have annoyed a technomancer. Think<br />
back—what have you done on recent runs? Have<br />
you let your enemies identify you?<br />
If you someday figure out that there’s a technomancer<br />
who has it in for you, you’re going to have<br />
a bunch of problems that you wouldn’t have with<br />
other enemies. One thing that a technomancer<br />
has in common with a decker is that they could be<br />
sitting pretty in Europort while mucking with your<br />
stuff in south Jersey City. You’ve got a couple of<br />
lines of attack. Firstly, if you, yourself, are a decker<br />
or a technomancer, then you can hit them the<br />
same way they hit you. You can hunt them down<br />
in the <strong>Matrix</strong>, maybe through old-fashioned legwork,<br />
maybe by looking at their meFeed, or whatever<br />
you come up with. Then you can ambush<br />
their icon and smack them till they cry. Of course,<br />
the fact that you’ve made an enemy of them and<br />
haven’t eliminated them already might mean that<br />
they are a better hacker than you, in which case<br />
Kyle Jones (Order #16164256)<br />
118 DIVING UNDER >>
TRACKING DOWN<br />
AN ENEMY TECHNOMANCER<br />
A technomancer enemy is, naturally. most likely to be<br />
encountered in the <strong>Matrix</strong>. If you want to prepare your<br />
defense or ready a counterattack, it first helps to know<br />
where your adversary might be. For this, there is the Trace<br />
Icon <strong>Matrix</strong> action, p. 243, SR5, repeated here for your<br />
convenience.<br />
hunting them down in the <strong>Matrix</strong> will probably<br />
be like a chihuahua attacking a doberman. Don’t<br />
abandon everything <strong>Matrix</strong>, though—there are still<br />
good leads that you can track down and information<br />
that you can glean. It’s just that this may not<br />
be the time to go in with virtual guns blazing.<br />
Unless you have an army.<br />
Let’s be honest, you probably can’t afford a<br />
hacker army, but it would be a very effective way<br />
of tracking down and killing an enemy hacker. You<br />
might also consider bringing in a technomancer of<br />
your very own. Ain’t nothing better at destroying<br />
sprites and technomancers than another one, it’s<br />
not like there is a big sisterhood or brotherhood of<br />
these bastards. You’ll probably be able to find and<br />
hire one that is willing to fight another, so spend<br />
some of that cash stockpile, work out which grid<br />
they hang their hat in, and go in with friends—as<br />
many as you can afford.<br />
A better idea than going after them in the <strong>Matrix</strong><br />
is to attack their weak, fleshy meat. Technomancers<br />
spend a lot of time in the <strong>Matrix</strong>, and<br />
while they are not necessarily weaklings, they will<br />
go down in a broken bleeding heap to someone<br />
who keeps themselves in peak physical condition.<br />
It’s often not even that hard to find out where they<br />
live, if you have the right contacts. Anyone who<br />
is skilled enough to come after you probably has<br />
a reputation, and if they have a reputation, you<br />
can use that to track them down. The hard bit is<br />
actually getting to (say) Singapore without them<br />
noticing and either hoofing it or preparing some<br />
sort of nasty surprise for you while you’re in the<br />
air. Remember that this person has it in for you,<br />
so they will probably notice if your name crops up<br />
on an international flight path. They might even<br />
notice if you get a taxi to a nearby bus station.<br />
Best bet is to spend the extra nuyen and buy the<br />
services of a coyote to get you to where you’re<br />
going. You can remain under the radar by being<br />
extra careful. Disguise your face so that cameras<br />
TRACE ICON<br />
(Complex Action)<br />
Marks Required: 2<br />
Test: Computer + Intuition [Data Processing] v. Willpower<br />
+ Sleaze<br />
You find the physical location of a device or persona<br />
in the <strong>Matrix</strong>. After succeeding with this action, you know<br />
the target’s location for as long as you have at least one<br />
mark on the target. This doesn’t work on hosts because<br />
they generally have no physical location, or IC programs<br />
because they are confined to their hosts.<br />
If you are unable to gain two marks on the target, you<br />
will have to use good old-fashioned legwork. Remember to<br />
use appropriate modifiers to any rolls made; for instance,<br />
the Distinctive Style quality adds +2 dice to tracking down<br />
the person who has it.<br />
have a harder time recognizing you, put a stone<br />
in your shoe to give yourself a limp, travel on your<br />
feet, or buy a bicycle or something, and while you<br />
are going to need a commlink of some sort, get<br />
yourself a new one. Seriously, leave your main<br />
’link at home (or with a friend, so it still looks like<br />
it’s moving about), and buy a cheap model without<br />
a camera when you get there to talk to your<br />
friends back home. Then ask around for someone<br />
who matches the description of your bogey, buy<br />
a few big guns (in case they have drones), turn off<br />
your wifi, and go kick down a door and pop some<br />
grenades.<br />
I hesitate to mention it, but if you don’t want to<br />
go to all that trouble, you could go for a non-violent<br />
solution. If you know who the technomancer<br />
is, you might be able to get a friend to talk to them<br />
and pressure them into backing off. One good<br />
way to do that is by making friends with someone<br />
close to them, or bribing someone close to them,<br />
and then seeing what it would take to back off. To<br />
be fair, if you really have fucked them over, you<br />
might have to try to undo whatever it was that<br />
honked them off. Whether this is worth your time<br />
and money is a decision that you’ll have to make,<br />
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE<br />
INFINITE<br />
REALMS<br />
POSTED BY: NETCAT<br />
We’ve detailed some parts of the Resonance<br />
realms before, but one of the tricks to a place that<br />
seems to be infinite, or at least as close enough<br />
that it might as well be inside out, is that there are<br />
perpetually new places to explore. I’ll run down<br />
some of the places I’ve encountered or heard<br />
about lately. Dive in!<br />
TOMBSTONES<br />
One of the Resonance realms I’ve been to recently<br />
that I have no real desire to revisit is a place<br />
called Tombstones. It seems like every program<br />
that has run in the past but is no longer supported,<br />
is obsolete, or has been replaced by something<br />
superior has come to rest here. The realm<br />
looks like endless rolling black hills under a starless<br />
black sky, where black and white tombstones<br />
contain the last output that these dead programs<br />
ever produced. The size and ornamentation of<br />
the tombstones seem to be related to how popular<br />
or widespread the program was. Some hills<br />
have hundreds of tiny plaques celebrating “Hello<br />
World” programs, where other hills may have<br />
just one large, forbidding sepulture to a piece of<br />
accounting software that was once used across<br />
the world but has now faded into history. Near<br />
the edges of the realm are graves where the programs<br />
they are attempting to contain are not<br />
quite dead. Error messages and other failures<br />
slowly update on the headstones, slowing down<br />
as the last few machines running these dying programs<br />
stutter and fall silent.<br />
Despite the fact that these programs have displayed<br />
their final output, there is still valuable information<br />
locked away behind obsolete interfaces<br />
and dead terminals. For the technomancer willing<br />
to put in the work, it’s possible to find all kinds of<br />
embarrassing or revealing information with a little<br />
bit of digital necromancy. In the Sixth World,<br />
where creative accounting history is almost a field<br />
unto itself, there are many financial trails that are<br />
digitally massaged so that they look innocent. Often<br />
old records can reveal the beginnings of data<br />
trails that can lead to criminal convictions, loss of<br />
employment, or a large dip in share values. This<br />
realm is a popular spot for technomancers who<br />
are looking for historic data, who are feeling nostalgic,<br />
or who are looking for a particular program<br />
they may have used or coded in their youth.<br />
The sprites who haunt this realm often seem to<br />
take on familiar human shapes. Often they appear<br />
to take their appearance from people who died<br />
in the various <strong>Matrix</strong> crashes, or who were the<br />
subject of virtual personality experiments. Small<br />
in numbers, a heartbreaking group of sprites appear<br />
to be modeled on technomancers who have<br />
died in corporate experimentation. None of these<br />
sprites seem interested in talking about any former<br />
lives they might have had; they only seem interested<br />
in keeping weeds off the burial sites.<br />
There are a few technomancers who come to<br />
try to find friends or family who have died in <strong>Matrix</strong>-related<br />
experiments, with some success. The<br />
sprites don’t seem to mind having people come<br />
and watch them, although it can be tragic when<br />
a technomancer prefers sitting and watching the<br />
e-ghost of a dead lover. Sometimes people become<br />
so absorbed watching their loved ones that<br />
they neglect their own body. Perhaps there are<br />
family groups of e-ghosts wandering the black<br />
hills.<br />
That whole thing creeps me out. It puts the consequences<br />
of anti-technomancer bias in my face,<br />
and their mournfulness feels like failure to actually<br />
live. It offers emotions I have no desire to feel.<br />
> As with so much of the realms, the problem here is the<br />
ratio of available data to useful data. For every financial<br />
program buried here, there are like a thousand endless<br />
runner games. And for every set of numbers that reveals<br />
Kyle Jones (Order #16164256)<br />
124 INFINITE REALMS >>
some past shenanigans, there are ten thousand sets of<br />
numbers that offer no useful information whatsoever. If<br />
you have no tips on where to find something useful, you’ll<br />
start to see how finding a needle in a haystack can feel like<br />
a comparatively easy task.<br />
> Icarus<br />
KERNEL PANIC<br />
It can be pretty mind-bending being a technomancer<br />
sometimes—using your brain to interact<br />
with the <strong>Matrix</strong> goes against everything that<br />
metahumanity has been trying to do for as long<br />
as we’ve been around. Twisting your brain around<br />
the metaphors and underlying structure of the<br />
Resonance is something we grow into, one piece<br />
at a time. Every time we gain another piece of<br />
insight, we grasp something that can help us understand<br />
things at a deeper level.<br />
That doesn’t seem possible with the realm that<br />
has been called Kernel Panic. My friends and I<br />
have a theory that Kernel Panic is raw, unfiltered<br />
Resonance, unshaped by anything—simple and<br />
honest. In any case, visiting Kernel Panic is a confusing<br />
experience. At first, there doesn’t appear<br />
to be any sculpting for the realm—colors, scents,<br />
and sounds combine in a bright welter of sensory<br />
information. If you can stand to stay for a while, a<br />
kind of order in the randomness emerges. Patterns<br />
shift and reverberate through different timescales.<br />
One moment you can see what looks like a sprite<br />
being assembled or born; another moment there<br />
is a series of discordant rising tones and the strong<br />
smell of vanilla drifting by while part of the fundamental<br />
essence of a complex form drifts past.<br />
At this point, many technomancers drop out of<br />
the experience, overloaded and overwhelmed. I<br />
know that the first time that I visited I needed a<br />
bit of me-time, so I stayed in the meat world for a<br />
while. The funny thing is that the weird sensations<br />
and patterns stuck with me for a while. I couldn’t<br />
stop thinking about them, and when I had worked<br />
through them it felt as if I’d solved a complicated<br />
equation while sifting through my own emotions.<br />
At that point, I noticed that the Resonance seemed<br />
easier to use, flowing with more clarity around me.<br />
Technomancers who are looking for more information<br />
about themselves and the Resonance<br />
may find that Kernel Panic helps them. I’ve heard<br />
of a lot of people who haven’t got anything from<br />
the experience, but then I’ve never heard of anyone<br />
who has gone dissonant because they visited<br />
the realm. It’s a popular destination for technomancers<br />
wanting to submerge.<br />
> I went and had some similar experiences to Netcat the first<br />
time. I loved it, and I decided I would go back regularly,<br />
treating it as a sort of meditative spot. It was great the first<br />
few times, but I noticed the calming effect started steadily<br />
declining. I don’t know if I was building up a resistance<br />
or something, or if I was just getting used to the weird<br />
patterns. I found myself wanting to find a way to get that<br />
initial sensation back, and that feeling tends to make me<br />
nervous. So I went cold turkey.<br />
> Hexatite<br />
> Probably just means you need to work harder to maintain<br />
your focus. Or the realm is working to drag you under its<br />
control. One or the other.<br />
> Puck<br />
THE FACTORY<br />
Each time a technomancer visits the Factory,<br />
they enter a side access door into a huge building.<br />
Looking across the Factory floor, you see<br />
sprites assembling other sprites out of Resonance.<br />
Huge crucibles of molten data swing high<br />
above, dripping and splattering hot raw Resonance<br />
around the feet of anyone in the vicinity.<br />
As you progress through the building, giant robots<br />
are created alongside tiny creatures, and all<br />
of them are transported off into a hazy orange<br />
KILL CODE As far as you know.<br />
> Puck<br />
On the other hand, who knows where sprites<br />
might go when they’ve been made? One thing is<br />
clear about this place—if you are looking for information<br />
about compiling or registering sprites, this<br />
realm has a lot of useful data. It tends to be a bit on<br />
the clinical side, which might well represent how<br />
metahumanity is learning about technomancers,<br />
sprites, and the Resonance.<br />
You can get some information by observing the<br />
construction processes, but more useful is finding<br />
and talking with a floor supervisor. Skilled and resonant<br />
technomancers even get to talk to the Factory<br />
Foreman. The supervisors are a little work-focused,<br />
but they’re usually willing to talk and can<br />
provide interesting insights into just how things<br />
are being assembled. The Foreman always carries<br />
an air of harried work overload, and it can be tough<br />
to pin him down for a conversation of any length.<br />
Flash a little Resonance-shaping skill, though, and<br />
he’ll be more likely to slow his pace and have a few<br />
words. It’s not at all clear who the Foreman reports<br />
to, or if there is even anyone who is higher up the<br />
food chain. In any case, having skilled sprites walk<br />
a technomancer through the processes they use<br />
teaches a lot about how to interact and deal with<br />
those beings.<br />
Sprites are everywhere in this realm, as are<br />
construction hazards and fast-moving delivery vehicles.<br />
Health and safety are treated seriously, but<br />
it’s not like technomancers and sprites are hurt by<br />
the same kinds of things. There is very little malice<br />
here, but accidents do happen. Watch your step.<br />
> A rookie mistake is keeping your eye only on the raw<br />
materials, thinking the danger comes from spilled molten<br />
metal or something, while ignoring the finished sprites.<br />
The sprites here, though, exist in varieties I have never<br />
encountered, and some are feral and quite mean. You<br />
might stroll by a sprite under construction that decides to<br />
take a bite out of you the moment it gets finished. Danger<br />
can come from anywhere.<br />
> Respec<br />
CRUFT: MISC. FLOTSAM<br />
FROM SOCIETIES<br />
Some of the Deep Resonance realms are harder<br />
to describe than others. Where most realms have<br />
a door or some sort of portal to open, in order<br />
to enter Cruft, you must push through a clinging,<br />
sticky matted mass of fibers. Once you make it<br />
through the first bunch, each step you take in the<br />
realm involves wading through deep masses of<br />
cotton-wool material, which clings and sticks.<br />
Pick up these fibers, and you can see all kinds of<br />
memes, viral images, and videos sliding along the<br />
fabric. Repetitive musical earworms gently tinkle<br />
through the air, as if being played somewhere<br />
far distant. The longer you stay in the realm, the<br />
more alone and isolated you feel, but picking up<br />
and watching the pictures and videos can ease<br />
the loneliness for a while. I find it hard to stay focused<br />
here—if I didn’t have shit to do, I could see<br />
myself wasting hours and hours watching various<br />
rodents or geometric repeating patterns. Different<br />
parts of the realm seem to be dedicated to<br />
different types of material, where one section<br />
might be mostly pictures of politicians crossed<br />
with animals, another might play repeating tunes,<br />
and yet another might show variations on the<br />
simsense three-emotion reel.<br />
There are not a lot of reasons to visit this realm<br />
for serious work, but there are a few useful pieces<br />
of information buried in the masses of cute animals.<br />
If you’re looking for something catchy to distract a<br />
group of people, you could do worse than to find<br />
a fitting meme buried in the Cruft. Probably more<br />
useful is the fact that it’s possible to get a gauge<br />
on how groups of people are feeling based on the<br />
material passing through this realm. If you want an<br />
idea of who might be getting a groundswell of support<br />
during an election, or if you need to work out<br />
what might be most damaging to a corporation,<br />
it’s possible to get inspiration here. Some technomancers<br />
also come here to numb the pain of ex-<br />
Kyle Jones (Order #16164256)<br />
126 INFINITE REALMS >>
KILL CODE As with most of the Resonance realms, the trick here is<br />
that there is a mass of data, and you have to figure out<br />
what it means. Yes, you’ll see pictures and videos, and<br />
you’ll get the sense of what some people are thinking<br />
about—but which people does the thread you’re<br />
looking at represent? There can be clues in the strands<br />
of fabric you’ll encounter, but these clues can be tricky.<br />
Is that tartan plaid you’re holding representative of<br />
some group of Scots, or executives who make Scotch<br />
tape? Does the dragon-scale pattern you see represent<br />
a particular dragon? The Draco Foundation? Saeder-<br />
Krupp? If you want to use the information you find, a<br />
guess is not good enough.<br />
> Netcat<br />
OUT OF BAND<br />
In the cracks between the other Resonance realms<br />
lies the raw networking that links the realms together.<br />
Not so much a realm itself, Out of Band is<br />
a pathway for moving between different realms.<br />
As you squeeze yourself into the realm, you feel<br />
yourself pulled at high speed through tunnels<br />
made of light. Most of the time this will last for a<br />
few tenths of a second before you arrive at your<br />
destination. Technomancers often feel that this<br />
is just the process to get to the other end, but if<br />
you are prepared for it and ready to hold on, it’s<br />
possible to keep yourself in the stream and stick<br />
in the pipe. On the edge of the information flow,<br />
shapes, sounds, and other sensations flow past. If<br />
you reach out, millions of independent fragments<br />
of information flow through and around you, creating<br />
a confusing torrent of raw data.<br />
Out of Band makes a good place to meet other<br />
technomancers, sprites, and other denizens of the<br />
Resonance, and technomancers who spend any<br />
reasonable amount of time in this realm generally<br />
find it easier to connect to the Resonance. It’s certainly<br />
easier to communicate with paragons here.<br />
Unlike many other Resonance realms, Out of<br />
Band doesn’t store information—it’s a conduit, not<br />
a repository, but some information from meatspace<br />
seems to travel through Out of Band to get<br />
to the other realms. I haven’t heard of anyone who<br />
KILL CODE Ready to go down a rabbit hole? The theory is that the<br />
Resonance realms records every bit of <strong>Matrix</strong> data, ever.<br />
And what happens in the Resonance realms counts. That<br />
includes Out of Band. So if someone changed a document<br />
while here, the original document and the changed<br />
document would be saved somewhere. So you could find<br />
both. Good luck with that—and determining which is the<br />
original and which is changed.<br />
> Hexatite<br />
HUMAN MALICE<br />
(DISSONANT REALM)<br />
Where many technomancers visit Resonance<br />
realms in order to learn more about what goes<br />
on there, or to create strange and unusual code,<br />
there are other realms that do not have those<br />
kinds of positive effects. These other realms<br />
swirl, not with chaos (well, not just with chaos),<br />
but with malevolent and dire information that<br />
can harm any data and personas that tread unwisely.<br />
Sensible technomancers don’t visit these<br />
places, but if you are very quick and careful, you<br />
might survive long enough to get out, and maybe<br />
cut the cord for a while to recover. Many people<br />
who visit these realms descend into madness<br />
and Dissonance, so these places are called Dissonant<br />
realms. We’re still not sure if the Resonance<br />
is one big ball of information with Resonant and<br />
Dissonant parts, or whether those two sources<br />
are related but ultimately separate. Or if they are<br />
something entirely else.<br />
One realm that a friend has reported on doesn’t<br />
really have a name, but I’ve taken to calling it the<br />
realm of Human Malice. If the Endless Archive is<br />
where every bit of information is stored carefully<br />
for the future, Human Malice is a hot, sweaty<br />
shack of revenge porn, doxxing information, online<br />
blackmail material and so on. Human Malice<br />
probably repeats some of the same information<br />
that the Endless Archive has, but where the Endless<br />
Archive has secrets carefully nested away under<br />
glass, Human Malice has insults, angry texts,<br />
heated invective, and video footage that people<br />
wished did not exist. Information on explosives<br />
and chemicals plaster the walls. The denizens of<br />
this realm look like twisted caricatures of humans.<br />
Distorted, sweaty sprites dressed almost exclusively<br />
in deteriorating rubber and split leather. No<br />
two of them are alike. It’s hard to know what the<br />
beings of this realm do, as no sane individual has<br />
stayed long enough to find out, but it’s unlikely to<br />
be good. There may be a paragon nestled deep in<br />
Human Malice, but I wouldn’t want to see it.<br />
REVERSING<br />
THE CURRENT<br />
POSTED BY: PUCK<br />
Let me tell you a story.<br />
Once there was a young man who lived in a<br />
kingdom that was broken. There were dozens<br />
of mud huts surrounding a grand castle, and of<br />
course the mud dwellers were never allowed into<br />
the castle. Scents of wonderful food sometimes<br />
drifted out of the castle’s window, and occasionally<br />
a carriage with plush velvet seats, pulled by<br />
horses as tall as two men, moved to and from the<br />
castle. The mud dwellers had a hint of the grandeur<br />
that was close by, but it was something they<br />
could never touch.<br />
The man, understandably, became bitter at<br />
this whole situation, and he decided to storm the<br />
castle and get some of the riches it held. First, he<br />
vowed to climb the wall, but he was met at the top<br />
by guards who rudely threw him to the ground.<br />
Then, he decided to tunnel under, only to find the<br />
foundation went deeper into the ground than he<br />
can imagine. Then, he decided to rob one of the<br />
carriages. And he actually succeeded, stealing<br />
away a small bag of coins and enough food for a<br />
full meal, which he shared with his family. It was<br />
the best meal they had ever eaten.<br />
The next day, guards from the castle emerged,<br />
found the man and his family, and killed the entire<br />
family. The man, they left alive.<br />
After that, his only goal was to burn the castle<br />
down.<br />
Is that man me? It has been, sometimes. Not all<br />
the time. I’ll bet it’s been a lot of you, too. I mean,<br />
isn’t that what we’re doing here? Seeing how<br />
much damage we can inflict on the fortress the<br />
Kyle Jones (Order #16164256)<br />
128 INFINITE REALMS >>
KILL CODE I’d be somewhat creeped out by this and objecting to<br />
Puck’s presence on this board if I didn’t have a part of me<br />
that totally understood what he is saying.<br />
> Mihoshi Oni<br />
And so we have Dissonant technomancers. In<br />
some ways, they’re like toxic shamans, who have<br />
given themselves over to the forces that would<br />
tear apart the world and have thrown their souls<br />
into channeling dark destruction. In other ways,<br />
they’re not like anything, because we do not have<br />
the words for all the things they do. Or to describe<br />
the tools they use.<br />
We know they channel Dissonance, but what<br />
does that mean? We’re still figuring out what<br />
Resonance is, and Dissonance is even less clear.<br />
Is it the anti-matter to Resonance’s matter? Is it<br />
a somewhat different wavelength of Resonance,<br />
where sometimes it can amplify Resonance,<br />
sometimes it can flatten it in destructive interference,<br />
depending on how and where it hits? Is it<br />
another force entirely that just happens to be able<br />
to interact with Resonance? I don’t know. I don’t<br />
even know what the Resonance is. I just learned<br />
how to use it.<br />
And some people are learning how to use Dissonance.<br />
I don’t believe I can talk about Dissonance<br />
streams the same way I can about Resonance<br />
streams. The Resonance is wild, but it also has …<br />
well, “flavors” doesn’t seem like quite the right<br />
word, but it’s also not entirely wrong. The streams<br />
are discernible.<br />
Maybe the streams in the Dissonance are discernible,<br />
too. I’m not willing to stare at them long<br />
enough to find out. What I have seen, though, is<br />
how people use the Dissonance. I’ve seen what<br />
they do, and to me and a number of other TMs I’ve<br />
talked to, there seem to be certain patterns. These<br />
aren’t tribes or anything—these are just ways of<br />
describing tendencies we’ve seen out there and<br />
putting people into groups based on this behavior.<br />
MORPHINAE<br />
This name came from an insect-loving friend of<br />
mine. She named these people after a lovely group<br />
of butterflies that are usually dark blue, black, and<br />
purple in color. Some of them flit from flower to<br />
flower; others fly higher than tree tops. She liked<br />
this name because it fits some technomancers<br />
who treat Dissonance like a toy, something to bat<br />
around and see where it goes. They have not fully<br />
submerged themselves in the Dissonance, but<br />
they don’t have their feet planted on the ground.<br />
It’s not clear where, or if, they will land.<br />
The biggest danger with the Morphinae is they<br />
are experimenting with something neither they,<br />
nor anyone else, fully understands. When they try<br />
to weave a complex form or summon a sprite out<br />
of Dissonance, they are not sure what will happen.<br />
And if they did something once that got a good,<br />
controllable reaction from the Dissonance—or at<br />
least something that they could dismiss before it<br />
turned on them—they make sure to never do that<br />
again. Control isn’t interesting to them. They always<br />
seek something different, something new,<br />
and, if things go their way, something disruptive.<br />
It’s the online nightclub where the dance floor<br />
starts undulating, then slowly slides up the wall,<br />
taking you with it. It’s the concert that turns into a<br />
dream—you’re in your underwear, you’re talking to<br />
people you can’t remember encountering, you’re<br />
here then you’re there without knowing how you<br />
got from one point to another. But it’s only odd if<br />
you stop and think about it. It’s the distant howl of<br />
an animal you never see, but you smell its musk.<br />
The noise continues for so long that you wonder<br />
how the creature ever breathes, but then you remember<br />
that of course it doesn’t have to. Its howl<br />
ebbs and flows, it rises so it pierces into your skull<br />
and bounces around, hitting a note that feels like<br />
it might melt your eyeballs. You try to shake it. But<br />
it won’t go away.<br />
I don’t know if you’ll ever experience those<br />
things, or things like those things. I don’t know<br />
what the Morphinae will unleash if you come near<br />
them. I just know that you won’t predict it.<br />
> These people are not the most powerful enemy you’ll<br />
ever encounter, but they rank among the most annoying,<br />
simply because they’re entirely unpredictable and<br />
impossible to reason with or anticipate. Any of the normal<br />
motives that might apply to someone—money, sex, selfpreservation,<br />
even basic curiosity—may or may not apply<br />
to them. They don’t employ tactics, you don’t have what<br />
they want, and you have no idea what they’ll unleash at<br />
you. Seriously, annoying as hell.<br />
> Pistons<br />
KILL CODE Wait, “sapient consciousness”? Is Puck saying this sort of<br />
thinking occurs in AIs?<br />
> Sounder<br />
> It does. Perhaps not as universally as it does among<br />
metahumans, but sapience comes with a certain need for<br />
intuitive creativity, and intuitive creativity comes with the<br />
chance of making connections that do not, in fact, exist.<br />
> Icarus<br />
Apophenians channel the Dissonance to make<br />
connections between points and elements on the<br />
<strong>Matrix</strong> that did not exist before their involvement.<br />
There is a decent possibility that these connections<br />
shouldn’t exist. But for better or worse, the<br />
Apophenians make them happen.<br />
This can be many things to people in our line<br />
of work—a blessing, a curse, a nuisance, or something<br />
else. For example, say you’re looking to get<br />
some paydata from a walled-off private host, and<br />
you find out some Apophenian had built a direct<br />
connection from, like, Dante’s Inferno. If that connection<br />
occurs before you break in—great, you just<br />
found an easy way to get somewhere that would<br />
otherwise take significant time and effort. But if<br />
they make the connection after you break in, your<br />
secretive operation is now interrupted by club goers<br />
looking for a secluded spot. You don’t want<br />
that to happen.<br />
> One of their more casual hobbies is to create infinite<br />
loops, where two locations are changed to refer only<br />
to each other, leaving anyone logged on there stuck.<br />
Yeah, you can log off, but sometimes they’ll try to close<br />
down those channels so you have to risk dumpshock.<br />
They’re charming.<br />
> Pistons<br />
That’s one of the more direct examples of their<br />
work. Many people are concerned that they are<br />
building other connections that are hidden and<br />
will not reveal themselves until the Apophenians<br />
have done enough to foment a catastrophe. Will<br />
they make a Crash 3.0-scale event? Unlikely. There<br />
is too much redundancy in the <strong>Matrix</strong>, too much<br />
monitoring by GOD for that to happen from a<br />
small group of actors planting slow-moving seeds.<br />
Will they cause bad craziness to erupt inside some<br />
hosts? You bet your ass.<br />
> One likely intended effect: Dissonance pools in<br />
unexpected places.<br />
> Netcat<br />
> And since this is Dissonance we’re talking about here,<br />
don’t be quick to dismiss them with a thought like, “well,<br />
at least they couldn’t connect X to Y, because <strong>Matrix</strong><br />
structures blah blah blah.” Dealing in Dissonance opens<br />
up possibilities most of us would rather not contemplate.<br />
> Hexatite<br />
ERISIANS<br />
This third “group” has been named after the Greek<br />
goddess of strife and discord, because honestly<br />
that’s as descriptive a name as you could get. They<br />
are the nihilists of the <strong>Matrix</strong>, prepared to burn<br />
the existing structure down and see what emerges<br />
from its wreckage. They are united in their worship<br />
of something none of them understand. That<br />
seems to be part of the worship—channeling Dissonance,<br />
letting it bloom (hmm, seems like the wrong<br />
word. Maybe “fester”?), seeing what it makes, what<br />
it destroys, and what it becomes. They stare at it,<br />
enraptured, the way an arsonist watches flames.<br />
They believe in Dissonance, but that belief can not<br />
be translated into any kind of identifiable system of<br />
values. Do they believe the Dissonance will build<br />
Kyle Jones (Order #16164256)<br />
130 INFINITE REALMS >>
KILL CODE You sound oddly condemnatory, given your past. I would<br />
think you’d be able to find some sympathy.<br />
> Nephrine<br />
> I figured that argument would come up. I know I made<br />
mistakes (though my assessment of what those are may<br />
not be in sync with what others think), but one thing<br />
I have never lacked is a sense of purpose. I have had<br />
an idea of what I want to happen, even when I have<br />
chosen the wrong means. The Erisians don’t have that<br />
understanding, at least not as far as they have been able<br />
to communicate to me.<br />
> Puck<br />
Some of you still might be inclined to seek Erisians<br />
out, for whatever reason. Since my encounters<br />
with them have been limited, I sought out others<br />
who had met them so they could share their<br />
impressions of what it was like to meet them. Here<br />
is a selection of their responses, with no identifying<br />
information because I have no desire to cause<br />
trouble for any of these people:<br />
I was in the Louvre host, just taking in some<br />
paintings, when the paint started liquifying, dripping<br />
down the canvas and off the frames. I turned<br />
and saw some people panicking, while others were<br />
frozen in place. Then they started to melt, too. I<br />
didn’t know if they had been there the whole time.<br />
I hadn’t been looking at them. I couldn’t say which<br />
of the people around me were real. Then the walls<br />
started melting, revealing what was behind them.<br />
What was behind them were spirals, twisting and<br />
turning, pulling people in. They made a noise like a<br />
metal saw. It felt like my teeth were disintegrating,<br />
even though my sim modules are nowhere near<br />
that sensitive. One of the spirals reached for me,<br />
and the whining became louder, and the disintegration<br />
moved into my skull, and I felt my head<br />
falling apart.<br />
When I woke up, I was offline. Ten hours had<br />
passed. I gotta get some neurological tests done.<br />
Files move here, files move there, just a normal<br />
day keeping the data and numbers flowing.<br />
On days like that—which is every day—anything<br />
different is welcome, so when I saw the first<br />
firework go off, I smiled. Then there were a few<br />
more, in red and orange and yellow. They were<br />
bright but soundless. Then more came, and they<br />
were bigger, and then each one—how can I say<br />
this?—shot out its own kind of reality. You could<br />
see each ember expand, and you could see a window<br />
into some other place in their growing circle.<br />
Some showed crowded cities, others vast deserts,<br />
others twisted alien landscapes. When people<br />
were hit by them, they disappeared. I didn’t know<br />
what happened to them. But then I got hit by one.<br />
Suddenly, I was standing on a cliff near a sunny<br />
beach. There were a few people strolling around,<br />
dipping their toes in the water, enjoying themselves.<br />
I had no idea where I was, but it turned<br />
out to be a pretty normal Horizon grid. I logged<br />
off and went on with my life. Our company grid<br />
was down for two entire days, and when it came<br />
back and I returned to work, three of my coworkers<br />
were gone. No one has said what happened<br />
to them.<br />
KILL CODE Puck seems to be a little obtuse on this one. Don’t we know<br />
one of the main purposes of people like the Erisians—to<br />
spread Dissonance?<br />
> Cosmo<br />
> One on level, maybe. On another level, maybe not.<br />
Part of the problem is that we know so little about<br />
what Dissonance is. Does it get stronger as it is more<br />
concentrated? Or is it best when it is spread out, so it<br />
can touch as much non-Dissonance as possible? Does<br />
Dissonance want to dominate the world, or just corrupt<br />
enough of it so that it acts as a spiced contrast to the<br />
order of the rest of the world. Or does neither the<br />
Dissonance nor its followers know anything about what<br />
they want, but they act out of some instinct or intuition<br />
whose roots are foreign to our ways of thinking? These<br />
questions helped prevent Puck from speaking with any<br />
certainty.<br />
> Pistons<br />
GAME<br />
INFORMATION<br />
NEW TECHNOMANCER<br />
QUALITIES: DISSONANT<br />
STREAMS<br />
What is the nature of data? To a resonant technomancer,<br />
data flows in specific patterns, and like<br />
electricity it seeks the path of least resistance.<br />
There is order in the world, and data seeks to<br />
obey. Dissonant technomancers deal with another<br />
flow, whose nature and rules are not clear, but<br />
it has a destructive, chaotic effect on Resonance.<br />
Dissonant technomancers do not seek to control<br />
this force so much as unleash it. The rules and science<br />
behind Dissonance are not really interesting<br />
to them. They treasure the experience, and they<br />
place that above things such as efficiency, logic,<br />
or morality. Is there any wonder that the allure of<br />
Dissonance is so strong?<br />
These streams follow the same rules as Resonant<br />
streams (p. 89), in that a stream costs 20 Karma<br />
to purchase and does not double its cost after<br />
character creation. A character cannot follow two<br />
streams simultaneously.<br />
MORPHINAE<br />
Like the butterflies from which they take their<br />
name, Morphinae flit to whatever catches their<br />
attention, and the direction of their gaze is not always<br />
clear. They are <strong>Matrix</strong> mad scientists, trying<br />
new things to see what happens without any regard<br />
for the consequences. Dissonance is a brave<br />
new world to the Morphinae, and because they<br />
have detached themselves from their mental<br />
blocks to accept their new reality, they are wild<br />
and unpredictable.<br />
Kyle Jones (Order #16164256)<br />
132 INFINITE REALMS >>
KILL CODE
KILL CODE >
KILL CODE
KILL CODE<br />
NULL<br />
SIGNS<br />
POSTED BY: DOUBLE A<br />
> Well, that was interesting. For anyone who missed it,<br />
the file I uploaded disappeared only 8.3 seconds after<br />
I completed the upload. I tried again, and it made it<br />
7.4 seconds before it disappeared from the system.<br />
Not just deleted—all records of the attempt gone. For<br />
anyone who managed a copy (and kept it) or is a real<br />
speed-reader, feel free to use the Null Sect post for<br />
commentary. I encrypted the title phrase, hoping that<br />
will keep Them at bay! I recommend avoiding names and<br />
specifics, since whoever They are, They have remarkable<br />
search software. Maybe we can have a conversation<br />
before They erase the data. I’m also going to send out a<br />
physical copy (I know, ewww) to a few people and keep<br />
tossing uploaded scans every few days, as long as it<br />
doesn’t get dangerous. If you’ve already got a copy, pass<br />
it on. They’ve focused on deleting the files up until now,<br />
as long as that’s where they put their focus, we’ll keep<br />
trying to free the information.<br />
As for the scan, well, it’s complicated. I got this sent<br />
to me from a courier I trust, and he said the guy on<br />
the other end was a frazzled mess who looked like he<br />
hadn’t slept in weeks. I read it, vetted a few things, and<br />
then tossed it up. And we saw what happened. Nothing<br />
like having a file deleted by some mysterious force to<br />
let you know you’re onto something. For all those who<br />
have a copy, I’m sorry about the state of his mind, his<br />
English, and his typing skills. It looks like he used some<br />
kind of offline typing system that doesn’t bother to<br />
correct typos and he wasn’t in any state of mind to go<br />
back and edit. So, with no further ado, I’ll toss it up one<br />
more time for dreks and funnies. Let’s see if they can<br />
get it in under five. This’ll all go up in a burst, then you<br />
can comment after.<br />
> Glitch<br />
> From the opening snippet I managed, this looks like what<br />
I was talking about. This guy got more, and probably<br />
lost more, but this has to be the same strangeness I was<br />
talking about in the Dark Terrors drop.<br />
> Puck<br />
> Pick up your postal order and you can read it all—he left<br />
me a side note that he sent you a copy.<br />
> Glitch<br />
> I’m a few thousand miles from that registered address.<br />
When I get back in the area, I’ll pick it up. Until then I’ll limit<br />
my nightmares to what I already know, and avoid adding<br />
any more looking over my shoulder.<br />
> Puck<br />
THE NULL SECT<br />
My name is Allan Ames. My street name is Double<br />
A. I worked primarily in the St. Louis sprawl<br />
until 2076; since then, I’ve been all over the world.<br />
I’m a decker, though I also possess a small connection<br />
to the Resonance. It stays small because<br />
of the interference created by my augmentations.<br />
Tetris took me in and tried to make me better, but<br />
I never managed to manipulate much. He’s dead<br />
now. The first casualty who pointed me down this<br />
path. I’m at the end now. Not much more I can<br />
do. I’ve interfered too many times. They didn’t<br />
care that much at first. But once They feel you are<br />
a threat, it’s a downhill path, usually starting with<br />
the erasure of your identity. Let me finish this intro<br />
bit. I worked with the Arch Villains for awhile<br />
until I became a liability. They’re a good crew despite<br />
the asinine name.<br />
As for this document, what I’m doing here is<br />
an attempt to work around Their normal protocols,<br />
outside Their sphere of influence. I apologize<br />
in advance for any errors. I’m a skilled typist,<br />
but it’s been a long time since I clicked away<br />
on something so archaic as this typing machine.<br />
I think it’s actually called a typewriter, but I’m not<br />
sure. I’ll type this, make some copies, send them<br />
where I think they’ll do the most good, and keep<br />
going, but I think this may be the straw that breaks<br />
the dot-camel’s back. I tell you all these things in<br />
Kyle Jones (Order #16164256)<br />
136 NULL SIGNS >>
case you may need to seek me out or may need to<br />
continue my investigation and wish to look for my<br />
original work. It’s there. Just dig.<br />
For others who have traveled a similar path, or<br />
those who I have talked to and discussed this topic<br />
and whom this concerns, or even those within<br />
this <strong>Matrix</strong> pit who are willing to listen to reason,<br />
I write this to tell you something has changed. For<br />
years this issue only concerned us technomancers<br />
and the AIs out there. They left the regular users<br />
alone, They left them to their standard user agreements<br />
and didn’t worry about device users, but<br />
technomancers, and even a few AIs, have friends.<br />
Friends who are willing to help, despite it not being<br />
their problem or their fight. But 2079 has seen<br />
changes to Their behavior. Too many regular users<br />
are interfering with Them. Too many rumors are<br />
spreading about Them. Now, They seem to have<br />
widened their scope of desires. They no longer<br />
just threaten the technomancers, AIs, and Monads<br />
(really just meatsuit AIs). They’ve expanded Their<br />
efforts. Maybe this was always the plan. Maybe we<br />
pushed too hard like we always do. Neither matters.<br />
Now, we just need to know what’s out there,<br />
and that’s where these pieces of paper are going<br />
to come in handy.<br />
Pulling the curtain back feels good, even if I am<br />
exposing myself to a metaphorical firing squad.<br />
Read on.<br />
Fight on.<br />
Hack the Planet.<br />
Defend our virtual realm.<br />
WHAT DO<br />
WE CALL THEM<br />
I call them the Null Sect, thanks to Puck’s little<br />
blurb elsewhere on JackPoint, and because nothing<br />
is available on them. They don’t have a formal<br />
name for themselves, just an agenda. This is<br />
one of the first things that astonishes me about<br />
them. They have no name, yet they can find data<br />
on themselves and their efforts with very little<br />
difficulty. While we use keywords and phrases<br />
to guide our searches, they use something else<br />
that detects patterns and conversations at a rate<br />
beyond even the fastest search programs on the<br />
highest-end systems out there. If the name Null<br />
Sect is sticking, it will just make it even easier for<br />
them to find data on them, but I don’t know any<br />
other way to communicate. We name things. It’s<br />
what we do. They don’t, it’s an easy early divide<br />
to identify our ways of thinking. Point is, that’s<br />
the name, but don’t expect naming to help this.<br />
Probably just makes it worse, but I need a reference<br />
point for myself. From here on, assume that<br />
“They, Them, Their” all refer to the Null Sect with<br />
those intentional capitalizations. And feel free to<br />
cut off this piece of the page if it helps keep this<br />
posted for more than a few minutes.<br />
WHAT DO THEY WANT<br />
A world free of us. And by us, I mean everyone.<br />
But, not like we all need to die, but like we all need<br />
to leave their world and stay out for good. This is<br />
where understanding some fundamental differences<br />
might be necessary. They exist in only one<br />
place—the <strong>Matrix</strong>. From the Foundation to the<br />
smallest host and across every Grid, they consider<br />
the <strong>Matrix</strong> to be theirs, and they want us out of<br />
it. It’s more than just wanting us to not be in the<br />
<strong>Matrix</strong>, they want what I refer to as a “meat free<br />
matrix.” This is a <strong>Matrix</strong> without personas, without<br />
technomancers, without deckers, without people<br />
on commlinks, without emerged technocritters,<br />
without any connection to the physical world.<br />
They even want a <strong>Matrix</strong> not reliant on the power<br />
provided by physical sources. Not steam, not<br />
sunlight, not tides, not geothermal energy. They<br />
want nothing from the physical world. They want<br />
people to no longer project their consciousnesses<br />
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE
KILL CODE >
KILL CODE I’ll put this right here at the top. Yes, I noticed there are<br />
several places where Double A didn’t capitalize as he<br />
intended, but we are all relatively intelligent and can<br />
read context clues, so stop spamming this log with<br />
corrections. The man typed this up on a damn typewriter.<br />
Dig one of those out of the trash heap, slam out a doc<br />
this large without any errors and you can then come here<br />
and comment. Thank you all for your understanding. And<br />
honestly, if I had my way, I’d go back and get rid of every<br />
capital, because it’s an easy search parameter to utilize.<br />
> Glitch<br />
> I’ve heard a lot of rumors from <strong>Matrix</strong> sleuths about<br />
their access accounts getting erased. One day they have<br />
access, the next, their account is erased and their getting<br />
an error message every time they try to log on. Given the<br />
work they do, and efforts they make to “free the data,” it’s<br />
very well possible they are being targeted by this group.<br />
> Slamm-0!<br />
> A technomancer I know—well, they used to be a<br />
technomancer—woke up in a recovery ward at a street<br />
doc with a body full of cyber. Most of the systems were<br />
secondhand and the doc mainly served as a chop shop<br />
for the local Yaks, but someone dropped off my buddy,<br />
transferred the doc a sizable sum, and ordered a full<br />
cybersuite installed. Needless to say, the techno lost<br />
his connection to the Resonance. He flipped his drek<br />
and started digging (that’s how I got involved) and we<br />
managed nada, zip, zero, null progress. Could have been<br />
something else, but it seems an interesting way to get a<br />
technomancer off the <strong>Matrix</strong>.<br />
> Butch<br />
> Why not just hire a hitman? A bullet to the brain deals<br />
with technomancers, too. The effort and funds to snatch,<br />
deliver, and then get a doc to install all that drek. Too much<br />
work for the reward.<br />
> Clockwork<br />
> Let’s look at this for arguments sake. The nuyen is nothing.<br />
Nuyen is code. They control code. He said many times that<br />
they don’t think like we do. They don’t think of life and<br />
death in the same way. They think on and off the <strong>Matrix</strong><br />
as life and death. Maybe, they have experienced enough<br />
e-ghosts, or the like, to think killing a technomancer just<br />
risks creating an e-ghost. Better to simply cut off their<br />
access.<br />
> Glitch<br />
> The <strong>Matrix</strong> without power? That sounds like a<br />
technomancer fantasy flick I caught last year. Post<br />
apocalyptic drivel that had technos ruling a world after<br />
it was sent back to the dark ages by an asteroid impact<br />
or something. Then along came a techno with different<br />
thinking and changed everyone’s mind, overthrew the<br />
powers, and the world went on happily ever after. The<br />
problem was, they never explained how a <strong>Matrix</strong> existed<br />
without devices.<br />
> /dev/grrl<br />
> Maybe the technos were the devices in the trid. Doesn’t<br />
match up with what he says they’re doing to technos here,<br />
since they’d be corralling them to run their <strong>Matrix</strong> on, but<br />
then again, that’s not meatless—that’s meat based.<br />
> Slamm-0!<br />
> Those Red Spread things sound more like a bunch of<br />
individuals all working together rather than a single entity.<br />
Especially if they can do all that drek at once. Based on<br />
what he says, I don’t think any of these things are limited<br />
by the normal rules we’ve put on the <strong>Matrix</strong> about size<br />
and function. It sounds like they take whatever shape they<br />
fragging feel like.<br />
> Bull<br />
KILL CODE I think I’ve seen a Clear-Out. That outline they form looks<br />
like it’s made of old magnetic tape, like the stuff in old reelto-reels<br />
or cassettes. I’m not entirely sure, could have just<br />
been a really tweaked persona. When I got a good look,<br />
they were hanging out in a Lone Star host and could have<br />
jacked out to disappear so fast, but I could have sworn I<br />
saw something move away. Most people I tell this story to<br />
have told me I’m nuts, but now it makes sense.<br />
> Turbo Bunny<br />
> Reports about something like the Nulls pop up often<br />
on the local forums and chat spots. I can’t find a single<br />
one up right now, but I know I’ve seen them before. I<br />
was positive about one over on the WizTechTime site,<br />
but now it says it was taken down by the moderator for<br />
content. I know for a fact the mod didn’t take anything<br />
down, because I’m the moderator.<br />
> Slamm-0!<br />
> That makes sense. WizTechTime is garbage!<br />
> Glitch<br />
> I’ll fess up to my utter hatred of technos, but I’m not some<br />
secret tool of a <strong>Matrix</strong> cult. I don’t care if you fragsacks<br />
believe me, but I’m saying straight up, I am not a part of<br />
this (deleted by sysop). If I happen to have taken a job to<br />
rid the world of a fraggin’ techno and it was contracted by<br />
them, oh well. I do that all the time. As for anything Double<br />
A may have tried to send me. I’ll never get it because I<br />
never stick around anyplace long enough for <strong>Matrix</strong><br />
trackers to nail me down, so some snail mail letter has<br />
an ice cube’s chance in hell of catching up to me. Maybe<br />
I’ll look into jobs I take, maybe I won’t, but anything that<br />
helps me rid the world of you freaks, I’ll be sure to offer<br />
special low-rates for my services.<br />
> Clockwork<br />
> I deleted dozens of lines insulting Clockwork. Stop wasting<br />
my memory stores. Keep it on point here. I also snipped<br />
the name of “Them”, as Double A puts it. Don’t drop it in<br />
here or we’re likely to lose this forum along with the data<br />
when it pops up.<br />
> Glitch<br />
> I’ve heard of Tam before. He’s like the bogeyman for<br />
technomancers. Far worse than even Clockwork. That<br />
headware treatment his doc performs has been the death<br />
sentence for dozens of TMs that would rather end their lives<br />
than live without the <strong>Matrix</strong>. The upside is that most don’t set<br />
off their cortex bombs and they get found during the autopsy.<br />
Though that is also the bad news because post-mort docs all<br />
over have been injured when they went to check the cranial<br />
cavity. Tam, or at least his MO, is connected to investigations<br />
in most corps and nations all over the world.<br />
> Stone<br />
> Nice thing about corporate police running cities is the<br />
connectivity between systems. If we could get the big<br />
boys (KE, Lone Star, Minuteman, etc.) to play nice together<br />
it would be even better, but that’s a pipe dream.<br />
> <strong>Kill</strong>joy<br />
> That would be a nightmare, not a pipe dream. They’d<br />
have most runners pinned in a few days. The only thing<br />
keeping them off us would be their corporate masters<br />
who would then just blackmail us into working for them.<br />
Don’t lose that positive attitude, kid, but maybe leave<br />
some naïveté behind.<br />
> Bull<br />
> Drek! Seagull! I heard nothing but positive things. She’s<br />
got a solid rep and a great list of contacts. Though, I guess<br />
one of those is a piece of drek, but everything I’ve heard of<br />
her has been solid chill.<br />
> KC<br />
> The Hitsec protocol was vicious. It buried targets in IC,<br />
launching program after program in a cascade of death. It<br />
focused heavily on every derivation of black IC available,<br />
operating on the concept that a brain-fried target has no<br />
chance of becoming a repeat offender against the system.<br />
> Netcat<br />
> Transys-Neuronet is rocketing up in several areas now that<br />
Celedyr isn’t flooding money into his pet project. With the<br />
fate of Eliohann within Boston still unknown, the efforts<br />
to wake him from his coma have been at least somewhat<br />
successful, Celedyr’s funding is moving to more lucrative<br />
projects and getting T-N back on the big-money track it was<br />
on before Celedyr became obsessed with fixing his kin.<br />
> Traveler Jones<br />
> I walked from a job in London involving a deep hack into<br />
T-N systems. The job was supposed to be a data insert with<br />
some other edits, but I didn’t think the cash was enough<br />
for that kind of trouble. Celedyr and company have solid<br />
e-security backed up by those Knights of Rage nutbags.<br />
Could have been O’Ryan trying to get her background<br />
changed so she could move over.<br />
> Respec<br />
> Celedyr’s still paying some attention to business in the<br />
newly reopened NEMAQZ. The wyrm has been putting<br />
cash into intel ops and runs in the area trying to get an idea<br />
of what happened to Eliohann. If it weren’t for the fact that<br />
the folks up near Salem, where he supposedly resides,<br />
are complete wackjobs, he may have figured something<br />
out by now, but they take their privacy seriously. Which<br />
means they’re probably hiding something.<br />
> Ire<br />
Kyle Jones (Order #16164256)<br />
154 NULL SIGNS >>
KILL CODE Either a crazy dragon or a dead dragon. Neither one is<br />
going to get them the kind of attention they want.<br />
> Slamm-0!<br />
> Or a perfectly sane dragon who now has a very quiet<br />
place to live and a very dedicated group of followers to<br />
worship him. Eliohann was never about ruling the world.<br />
> Ire<br />
> The Lost Children have expanded to the Seattle and PWV<br />
Metroplexes. The Seattle cell had a serious recruitment<br />
push not too long ago and may be larger than the normal<br />
four-person size, or they have more than one cell. The<br />
ones in PWV seem focused on disrupting Evo’s efforts in<br />
the city, including their relationship with other Monads<br />
who stayed back.<br />
> Plan 10<br />
> I know the decker who set up the host for Hoodville.<br />
Goes by the handle of 3D, and he’s been buddying up<br />
with hackers with serious assault talent over the past few<br />
months. He may be looking to put together a force to try<br />
to clear out his host. I don’t know if that is even possible,<br />
but he’s the type to share the info on whether or not it<br />
works after the fact. Though if he doesn’t say anything, it<br />
probably failed and he’s a dead troll.<br />
> Slamm-0!<br />
> 3D has also been looking for talent willing to go offworld<br />
as well. Seems he has an interest in Gagarin. He’s<br />
not alone in this. Several corps have started looking<br />
for shadowrunners willing to be spacerunners in order<br />
to gain access to any intel the Monads may have left<br />
behind. Evo has the jump, since they still had an in, but<br />
they lost tons of personnel, leaving the place ripe for the<br />
picking.<br />
> Fianchetto<br />
> Z-O, and therefore the Corporate Court, has a solution.<br />
Great. Yet another thing they can lord over us to keep us<br />
down.<br />
> Balladeer<br />
> The Blazing Parrot is well known in that region as the<br />
spot to collect bounties on technocritters. Not sure if that<br />
means collusion with these things, but it’s definitely a<br />
similar area of interest.<br />
> Picador<br />
> PWV transit hub? Is that the one that was rumored to have<br />
been run by an AI? That’s why they got so efficient, so fast.<br />
Now, the question to ask is if that AI is still there, or if it got<br />
decoded when the host was seeded.<br />
> Traveler Jones<br />
> Anyone else find it strange that he named places this was<br />
sent? If THEY get ahold of a copy, which they obviously<br />
have because it’s getting deleted from here, then they<br />
know where else to look.<br />
> Ecotope<br />
> I read it as something for us. Something to let us know<br />
there are others out there who share this burden. We<br />
know that if we lose our copy, there are others who have<br />
it as a backup.<br />
> Netcat<br />
> Or it’s a list of targets for someone to hit and clear out<br />
every hardcopy he’s sent.<br />
> Thorn<br />
> There are more copies out there than he has mentioned. I<br />
already made sure of that.<br />
> Glitch<br />
> Way to paint the target.<br />
> Hard Exit<br />
> “Do not live in fear of the darkness. Shine a light on it and<br />
you will see there is nothing to fear.” —FastJack<br />
> Glitch<br />
> Drek! That’s what they’re doing. Chummers have been<br />
getting brainfried left and right on Aegis gigs. Fair warning<br />
for anyone jumping on that money train, it’s no walk in the<br />
park.<br />
> Bull<br />
> Not well hidden, but I don’t mind. If you need Monad<br />
assistance, I’m the Plan you talk to.<br />
> Plan 10<br />
> Feel free to also talk to me, and I’ll leave a message for my<br />
other half.<br />
> Plan 9<br />
> That’s not really how that works, right?<br />
> Respec<br />
> That claim at the end? “De la Mar was right”? The line<br />
that makes me look at this whole thing and think it’s<br />
all bogeyman hooey. Danielle de la Mar is a monster.<br />
She is the monster, when it comes to the <strong>Matrix</strong>. Her<br />
changes add more shackles, and since the last set she<br />
helped impose were obviously not tight enough, now<br />
she wants to lock us down even further. Double A, thanks<br />
for the effort, but that one paragraph makes me discount<br />
everything you typed.<br />
> Slamm-0!<br />
KILL CODE<br />
INTO THE WILD<br />
POSTED BY: PISTONS<br />
You can always find a reason to go into the known<br />
areas of the <strong>Matrix</strong>. I don’t need to explain that to<br />
you, right? We all live online all the time, whether<br />
in AR or VR, so we know what’s out there, what<br />
we can do with it, and who will pay us to mess<br />
around in particular areas. But more and more,<br />
we’re learning about all the unknown ares of the<br />
<strong>Matrix</strong>—the wild, the wooly, and the undefined.<br />
At least, not defined by us. And if you’re like me,<br />
the mere existence of this unexplored territory is<br />
a nigh-irresistable siren’s call.<br />
> Allow me to gently point out that many of these areas<br />
are only “unexplored” if you view them the same way<br />
that European explorers saw the Americas—that is,<br />
with complete disregard for the inhabitants who were<br />
already there.<br />
> Icarus<br />
> Point taken. I should have more clearly expressed that I<br />
meant “unknown to carbon-based beings.”<br />
> Pistons<br />
The trouble with exploring these areas is that it<br />
can be both dangerous and time-consuming. Danger<br />
we can deal with—it’s part of our daily lives, so<br />
all we need is the right information and a little luck.<br />
I’ll try to cover the information part of the equation.<br />
The luck will be up to you.<br />
Time is only an issue if someone isn’t paying for<br />
it. That’s the trick, though—sure, you can find people<br />
who will pay you to go find some juicy paydata,<br />
but who is going to pay you to hack through<br />
jungles of unruly code?<br />
Because I care, I have some answers for you. I’ll<br />
share some sources of money you might be able<br />
to tap if you want to venture into the wild.<br />
> … while saving some of the more lucrative sources for<br />
yourself.<br />
> Netcat<br />
> Of course. What am I, an idiot?<br />
> Pistons<br />
But first, let’s look at the risks.<br />
UNRULY<br />
AND FUNKY<br />
This whole idea of exploring the unknown parts<br />
of the <strong>Matrix</strong> sometimes feels counter-intuitive,<br />
because many of us are used to thinking of the<br />
<strong>Matrix</strong> as an entirely constructed entity. It only<br />
exists because we built it, this thinking goes. So<br />
how wild can it be, really?<br />
Much of the <strong>Matrix</strong> is constructed, it’s true, but<br />
we’re coming to a realization of just how many<br />
beings have constructed it. AIs and protosapients<br />
have greatly altered existing and abandoned portions<br />
of the <strong>Matrix</strong>, and they also have built entirely<br />
new sections on their own. So these sections<br />
can get quite wild indeed.<br />
Then we have the foundations. Everyone who<br />
understands foundations, raise your right hand.<br />
Now everyone look at your right hand, and know<br />
that if yours is in the air, you have a severe honesty<br />
problem and might possibly be attempting to<br />
deceive yourself, which is never healthy. Change<br />
your ways immediately. Starting with lowering<br />
your hand.<br />
The rest of us know that the foundations are<br />
completely unruly, and while for the most part<br />
hosts are deliberately sculpted out of these foundations,<br />
there are nodules that grow out of them<br />
and sometimes become their own wild hosts.<br />
Yeah. They’re completely funky. And really hard to<br />
find. But so fascinating when you do.<br />
> How often is the nature of these wild hosts determined<br />
by the nature of the foundation? That is, can you see a<br />
connection between various hosts that grow out of a<br />
Kyle Jones (Order #16164256)<br />
156 INTO THE WILD >>
single foundation, so that you can tell that there is some<br />
consistent element contributed by that foundation?<br />
> Beaker<br />
> Short answer: not really. Longer answer: The data sets<br />
are usually too small for valid comparisons. Wild hosts<br />
are rare, and multiple wild hosts growing out of a single<br />
foundation are rarer still, so trying to make comparisons<br />
between multiple wild hosts to see if they share a<br />
common element is difficult. You could compare them to<br />
constructed hosts, but since those hosts are deliberately<br />
planned, it’s exceedingly difficult to tell if there is any part<br />
of a host that was shaped by its foundations rather than<br />
its designers. So we really have nowhere near enough<br />
information to answer the original question in anything<br />
approaching definitive fashion.<br />
> Netcat<br />
Here are some specific things to consider should<br />
you decide to venture into these particular wilds.<br />
GOD (USUALLY)<br />
ISN’T WATCHING<br />
That title alone might be enough to tempt some<br />
of you to go visit the untamed parts of the <strong>Matrix</strong>.<br />
Being able to hack without being under the<br />
ever-watchful and punitive eye of GOD is a treasured<br />
dream to some of us, and the freedom this<br />
promises can seem like a version of paradise.<br />
And let me be clear—there are times when it truly<br />
is awesome. You can mess around with code<br />
in a pure, unfiltered way that is completely untethered<br />
by worry. You don’t have to worry about<br />
<strong>Matrix</strong> standards, or GOD’s sometimes arbitrary<br />
delineation of what is legal and what is illegal.<br />
Sometimes you don’t know how stressful life under<br />
that ever-present eye is until it’s gone.<br />
But then you also realize that said watchfulness<br />
might have some benefits. And I feel horrible saying<br />
that. But the sheer irregularity and unpredictability<br />
of the wild <strong>Matrix</strong> can be dangerous. Items<br />
and entities can disguise themselves and hide in<br />
ways you might not begin to suspect. And the underlying<br />
code of a host may be unstable, so that<br />
moving in that host is like walking on the floating<br />
rocks in a river of molten lava—you don’t know<br />
how thin or hot they might be, when they might<br />
disappear into liquid, and when flames might suddenly<br />
erupt from anyplace. And even that image<br />
is more stable and predictable than some parts of<br />
the wild <strong>Matrix</strong>—rather than worrying about flames<br />
breaking out, you might be worried about, oh, I<br />
don’t know, a vine covered in razor-sharp thorns<br />
suddenly thrusting out and wrapping around you.<br />
Or maybe the rocks you’re stepping on don’t melt,<br />
but instead turn into psychotic clowns with slippery<br />
torsos and glue-covered hands, and they<br />
grab at you and laugh with a sound that not only<br />
turns your stomach like the worst flu you’ve ever<br />
experienced but also comes with a torrent of small<br />
rocks that hits your skin like sandpaper, wearing<br />
down the outer few layers.<br />
Still, even in the chaos, the thrill of being able to<br />
do what you want without GOD even thinking of<br />
interfering with you occasionally returns. It’s not a<br />
bad feeling.<br />
STRUCTURES<br />
ARE UNSTABLE<br />
I mentioned this above, but when you venture<br />
into the wild, you can’t expect the <strong>Matrix</strong> to<br />
behave like it normally does. If you don’t know<br />
what this is like, talk to some mage or shaman<br />
acquaintance about what it’s like to go through<br />
an area of wildly fluctuating mana, where one<br />
moment a spell might completely fizzle out, the<br />
next it might blow up in your face. Honestly, if<br />
they’re lucky, they’ve never experienced such a<br />
thing so they can’t explain it, but those few who<br />
have can tell you that it’s a nightmare. When<br />
you run the shadows, you lean on certain tools<br />
KILL CODE This is serious drek. There was one time I was in a wild<br />
host, and the sculpting was … well, this is one of the<br />
challenges of the wild <strong>Matrix</strong>—trying to describe it often<br />
comes off like some street corner burnout talking about<br />
their latest tripchip flight. But it was like a kind of forest of<br />
rock spires that were tall, thin, and teetering, some with<br />
stairs winding up their sides, others with rickety ladders<br />
perched against them. The floor wasn’t a good place to<br />
be—it was covered with caltrop-like spikes and prowled<br />
by wild programs that didn’t seem to mind the spikes. So<br />
I was learning how to navigate by moving from spire to<br />
spire, often using ladders to propel me from one spire<br />
to another (which works in the <strong>Matrix</strong> because I’m so<br />
fragging graceful in there that I make Olympians look<br />
like cement-shoe-clad hippos), and at one point I was on<br />
a ladder that was at least twenty meters high, and only<br />
one foot on the highest rung, when the ladder abruptly<br />
turned into matchsticks and the ground was covered with<br />
straw. The movement of the ladder caused friction that set<br />
it alight, and it in turn set the ground in fire.<br />
Long story short, I still feel traces of the headache I<br />
had when I finally logged out.<br />
> Glitch<br />
> I really need to get to know Glitch beyond his role as an<br />
admin here.<br />
> Ma’Fan<br />
Kyle Jones (Order #16164256)<br />
158 INTO THE WILD >>
KILL CODE If you can get a long look at the base code of a<br />
protosapient—and somehow understand it—you’d<br />
have some info worth more than a few nuyen to a<br />
number of corps.<br />
> Netcat<br />
> Leave them alone. What did they ever do to you?<br />
> Puck<br />
> Wrapped a tentacle around my head and put some sort of<br />
needle into my brain that left my right arm twitching for<br />
like six weeks. Thanks for asking.<br />
> Netcat<br />
A FEW EXAMPLES<br />
No one, of course, has exhaustively identified all,<br />
or even most, of the wild hosts out there, so don’t<br />
expect to find anything close to a complete guide<br />
to them. But in case you want to try your hand at<br />
exploring some of these areas, here are some of<br />
the hosts I know about.<br />
THE KNOWN UNIVERSE<br />
This host revels in three-dimensional movement.<br />
Almost all of the locations in it are fairly small—a<br />
simple platform, a single-room house, or a threeflat<br />
brownstone are some examples. Gravity here<br />
is odd, working in whatever way each location<br />
requires. For a house or other building, gravity is<br />
whatever the orientation of the building determines<br />
is “down.” If it’s a sphere (a small one—the<br />
largest spherical locations here are about a kilometer<br />
in diameter) gravity pulls you to the center<br />
of the ball, which presents a weird perspective as<br />
someone walks away from you and curves over<br />
the horizon. And typically on a platform, you<br />
can walk on either flat side. Movement from location<br />
to location is done by jumping and floating.<br />
While you can “breathe” anywhere in this<br />
host, once you’re away from a location (like more<br />
than five meters or so) it’s like you’re floating<br />
in a zero gravity vacuum, with all the pleasures<br />
and difficulties that come with it. If you’re floating<br />
between locations and are off track in getting<br />
to your desired organization, you need to make<br />
a course adjustment, which is not easy. Simply<br />
waving your arms won’t do much to change your<br />
direction, because physics. Blowing does a little<br />
more, but if you need to adjust by more than a<br />
meter or so, you risk hyperventilation. Best solution?<br />
Program yourself up a can of compressed<br />
air or some sort of aerosol and use it as a mini<br />
booster engine.<br />
> Aerosol? Come on—fire extinguisher! Go big or go home!<br />
> Slamm-0!<br />
So that’s how you move around. But what can<br />
you find there? With the available plots of land<br />
being so small, the larger ones are treasured and<br />
frequently fought over. There is one house, a<br />
three-story Queen Anne-style home, that is treasured<br />
by many of the denizens of this host, and<br />
they fight over it frequently. They value the structure<br />
too much to directly bombard it, so the house<br />
KILL CODE The fact that there are a fair amount of cyberwerewolves<br />
in this host only adds to the horror.<br />
> Netcat<br />
The reasons the house is so valued are not<br />
entirely clear. Yes, it’s large and comfortable, but<br />
is that really worth the cost of living in constant<br />
combat and terror? There has to be something<br />
else going on. Some people have posited that<br />
each location in this host actually corresponds to<br />
another place on the <strong>Matrix</strong>, and that controlling<br />
the location gives you extra advantages in whatever<br />
place it corresponds to. But I don’t have clear<br />
information on where those corresponding locations<br />
may be, or what advantages are gained.<br />
Perhaps more credible, in my mind, is that the<br />
house is a spawning ground for AIs and protosapients.<br />
I’ve never been inside, but reports say there<br />
is a basement door near the rear kitchen (yeah,<br />
there are two kitchens) that appears to lead to a<br />
basement, and there is a glow around the edges as<br />
if some sort of light is always on behind it. Behind<br />
that door, <strong>Matrix</strong> creatures are spawned, and there<br />
are many who would like to gain access to such a<br />
spot.<br />
> The same people who wanted to “study” technomancers<br />
are highly interested in finding ways to essentially enslave<br />
AIs. The idea is that you’d get all the strengths of an agent,<br />
but the intelligence and creativity of a sapient being.<br />
> Cosmo<br />
> The idea is that anyone who would do that is a monster.<br />
> Puck<br />
All the locations near this house are staging or<br />
planning areas for beings who want to take it over.<br />
Beyond that? It’s mostly unknown to me.<br />
THE SINTAX LAIR<br />
Want your mind blown into tiny particles of dust?<br />
Go here. You may have heard of SINtaxes, besuited<br />
and weirdly jointed beings that wander the<br />
<strong>Matrix</strong> and mess things up. Well, this spot belongs<br />
to them, and pretty much the rest of the<br />
<strong>Matrix</strong> is happy to let them have it. Descriptions<br />
of this place are useless, because almost nothing<br />
conforms to reality as we know it. Even frequent<br />
metaplanar travelers find this place odd and disorienting.<br />
The best way to describe it is to think<br />
of a time when local noise totally overwhelmed<br />
your PAN, or something in your glasses or contacts<br />
or whatever viewing device you were using<br />
went on the fritz, so that instead of making AROs<br />
that looked like things you are accustomed to<br />
seeing, you got distortions and weird blocks of<br />
color, and nothing cohered into any clear thing.<br />
Now make everything around you like that, all<br />
the time.<br />
The exceptions to this are the SINtaxes themselves.<br />
They remain clear and sharp, for reasons I<br />
cannot begin to explain. They move through their<br />
blasted home, constantly re-arranging what already<br />
seems to be hopelessly distorted. At least they<br />
seem less jittery in this realm than they do in other<br />
parts of the <strong>Matrix</strong>, and they usually let non-SINtaxes<br />
pass by without harassment, or even attention.<br />
There may well be some secrets buried in all<br />
the distortion, but damned if I know what, or<br />
where, it is.<br />
> The secret of the SINtaxes’ existence, and their purpose,<br />
might well be hidden in this host. The deeper the corps<br />
drill into the foundations, the more interested in that<br />
information they will be.<br />
> The Smiling Bandit<br />
THE KINGDOM OF VELKAR<br />
I started with some weird an disorienting places,<br />
so let’s end this section with something a little easier<br />
on the eyes, though no less confounding. The<br />
Kingdom of Velkar is the fantasy kingdom of your<br />
dreams. Snow-capped mountains rise into sapphire<br />
skies, where the clouds are light and fluffy,<br />
unless a dramatically appropriate storm is needed.<br />
Ivory castles overlook fertile valleys, and they<br />
have colorful pennants snapping in the breeze.<br />
Proud horses with mighty legs and flowing manes<br />
carry knights who wear armor that gleams almost<br />
as bright as their pure, white teeth. The occasional<br />
dragon wheels overhead, only to be chased away<br />
by fire emerging from the fingertips of a wizard<br />
standing watch in a soaring tower. The princes and<br />
princesses are all gentle, lovely, and forever waiting<br />
for some brave soul to come rescue them from<br />
whatever plight they have gotten themselves into.<br />
The ogres, trolls, and other creatures that roam the<br />
land are fierce and frightening, but still possess<br />
Kyle Jones (Order #16164256)<br />
160 INTO THE WILD >>
KILL CODE How did I not know you have been there? Have you met<br />
Lord Thisslesmoke? Isn’t he the worst?<br />
> Slamm-0!<br />
> Sooooo bad! I mean, literally, the worst! I really want to sit<br />
the king down and explain how badly he’s being yanked<br />
around, but I can never get him to sit still long enough to<br />
make this clear.<br />
> Pistons<br />
> Wait, you’ve met the king?<br />
> Slamm-0!<br />
> Quick conversations, while he goes from one place to<br />
another, usually. Make a connection with Esdrilla, the<br />
castle steward. She can set you up and help you deal with<br />
the weird layout of Castle Stukoria.<br />
> Pistons<br />
> Esdrilla? I have problems with her. She usually doesn’t<br />
say much to me, just walks past and glares.<br />
> Slamm-0!<br />
> Were you a dick to her at some point?<br />
> Pistons<br />
> Hmm. All right, you make a strong point. I’ll try to make it<br />
up to her.<br />
> Slamm-0!<br />
> Aaaaaand I think that’s enough of the local color for now.<br />
You guys can take your conversation elsewhere. But while<br />
I’m talking, let me ask this—is there any indication that<br />
any part of this kingdom existed before the Yellowstone<br />
Incident?<br />
> Glitch<br />
GETTING PAID<br />
Now that we’ve covered a little bit about what<br />
you can expect to find in the untamed parts of<br />
the <strong>Matrix</strong>, let’s take a look at who will send you<br />
there, because risking your brain for free is not<br />
something we should be doing.<br />
EVO<br />
Who else? Part of Evo’s corporate culture is that<br />
they never know where the next marketable idea<br />
will come from. Look at the Monads. Did they<br />
plan that whole situation? Hell, no. They started<br />
looking at how to digitize consciousness. Then<br />
they helped foment an AI rebellion. Then some<br />
of those rebels came into new bodies, and Evo<br />
welcomed those that they could get along with.<br />
Then these individuals’ new ways of thinking led<br />
to some of the killer new tech discussed in the<br />
Street Lethal download.<br />
If Evo could get some marketable tech through<br />
that process, who’s to say they won’t find something<br />
by exploring the untamed parts of the <strong>Matrix</strong>?<br />
Untold software breakthroughs might be<br />
waiting there for them, and they will throw a little<br />
money in that direction to find them. So work your<br />
Evo contacts and convince them that you should<br />
be sent on safari. Be warned, though—if you don’t<br />
show results before too long, you’ll lose your funding.<br />
And maybe your thumbs.<br />
> Don’t just wander in with some hothead decker and think<br />
Evo will throw money at you. Significant programming<br />
skill is needed. Show them that you know what you’re<br />
doing.<br />
> Beaker<br />
GRID OVERWATCH<br />
DIVISION<br />
Yeah, that’s right! You can sleep with the enemy!<br />
But the logic here is simple—who has more need<br />
to know about emerging <strong>Matrix</strong> threats than<br />
GOD? And where is the best hiding place for<br />
emerging threats? Plus, it’s not like GOD agents<br />
have so much time on their hands that they can<br />
stage their own expeditions.<br />
They’re also not naïve. They know that the<br />
people with the skills, flexibility, and creativity to<br />
handle these explorations are likely to be shadowrunners,<br />
so they know that’s who they will need to<br />
KILL CODE Yes, because I want to give more power to the people who<br />
try to make my life hell.<br />
> Slamm-0!<br />
> Who said the information you supply has to be accurate?<br />
> Netcat<br />
MITSUHAMA<br />
> Oh, come on! GOD, and now this? What’s the next entry,<br />
time-traveling Hitler?<br />
> Netcat<br />
Mitsuhama is nowhere as loose and informal in<br />
this area as Evo, but they do plenty of tech work,<br />
so they might find value in some of your explorations.<br />
Just don’t think you’re going to go in cold.<br />
With MCT, your best bet is to find something on<br />
your own, then bring it to them and show them it’s<br />
valuable. If you do that right, they may want exclusive<br />
rights to whatever you find next, and that<br />
means payment in advance.<br />
The easiest way to get MCT interested in something<br />
is to show them some way it could be used<br />
in <strong>Matrix</strong> security. They love that drek. Show them<br />
a way to use a protosapient in some VR system,<br />
or hack your way through some particularly dense<br />
<strong>Matrix</strong> undergrowth and then show MCT the code<br />
that caused you so much difficulty. The best part<br />
of it is, you should know the weaknesses of whatever<br />
you give them better than anyone else, so<br />
you’ll have a leg up.<br />
> Yeah, and if any AIs find out you squealed to Renraku<br />
about them, they’ll be delighted! They certainly won’t plot<br />
revenge!<br />
> Puck<br />
WUXING<br />
Is there feng shui in the <strong>Matrix</strong>? There are spirited<br />
debates about this occurring inside Wuxing<br />
and its various subsidiaries, but there are enough<br />
people who both believe it’s a thing and who<br />
have access to funding to give us something to<br />
do in this area. A lot of Wuxing’s attention will focus<br />
on protosapients, due to their unpredictability<br />
and their tendency to mess up any hosts that<br />
they visit. Any info you can provide about keeping<br />
protosapients away, repelling them should<br />
they wander in, and repairing any damage they<br />
cause would be of interest to Wuxing. The other<br />
subject they’re interested in is more complicated—the<br />
nature of foundations and how wild hosts<br />
sometimes spring up from them. My expeditions<br />
to these uncharted parts of the <strong>Matrix</strong> have not<br />
helped me understand this with any degree of<br />
confidence, but if you can do better than me,<br />
have at it.<br />
> The upshot of this entire section is fairly simple: Corps like<br />
control and predictability. Encroaching chaos makes them<br />
nervous. Convince them that you can enhance the former<br />
and reduce the latter, and it can be worth money to them.<br />
> Mr. Bonds<br />
> That last sentence should read “Leaving a backdoor for<br />
yourself should be a standard part of any code you ever<br />
give a corp. Also, share with your friends.”<br />
> Slamm-0!<br />
RENRAKU<br />
No corporation is as eager to learn about AIs they<br />
don’t know about as Renraku. Need I say more?<br />
Convince them you’ll dig up things they don’t<br />
know about AIs, and they may send some money<br />
your way. It’s that simple.<br />
Kyle Jones (Order #16164256)<br />
162 INTO THE WILD >>
KILL CODE
KILL CODE<br />
THE CORE OF<br />
CONSCIOUSNESS<br />
POSTED BY: G-NOME<br />
AND TECH-SPLORER<br />
G: When Glitch posted Untamed Wilderness<br />
over in Howling Shadows, I don’t think even he realized<br />
the massive can of worms he was opening<br />
up. And, I mean worms, literally! My work in the<br />
same drop has gotten me more fame than I cared<br />
for, and the attention of a particularly unfriendly<br />
group of runners who hate gnomes—me in particular—for<br />
reasons I haven’t bothered to look up.<br />
Thanks to some assistance from a few members<br />
here, I built a debt. I agreed to pay off the debt<br />
by helping out a youngster with a similar focus<br />
in her life as me but a drastically different field of<br />
exploration. Tech-splorer was handed to me as a<br />
protégé of sorts, and I helped teach her that research<br />
and scientific endeavors in the <strong>Matrix</strong> are<br />
not so different from the physical world—many<br />
of the same principles apply. Together we delved<br />
into the <strong>Matrix</strong>, far and wide (this place is huge,<br />
FYI), and started hunting, studying, and discovering<br />
the virtual wildlife that Glitch was kind enough<br />
to brush the surface of. Cyberwerewolf may be a<br />
terrifying set of thirteen letters, but yogi beats it in<br />
scariness and has only four letters, though they are<br />
drastically different creatures.<br />
T: Thank you, Grandpa G, for your stunning introduction.<br />
Now let the expert take it from here.<br />
I’ll skip over the origin speculation because the research<br />
is garbage, just like the stuff they’ve done<br />
on technomancers like myself. The quick and dirty<br />
is, the <strong>Matrix</strong> got big and has grown beyond our<br />
understanding, and things have emerged from it<br />
across the kingdoms of life. Yes, that means there<br />
are emerged bacteria and several species of rather<br />
interesting phytoplankton, but what matters here<br />
is what matters to the shadows. In that area we focus<br />
on two things: what makes us dead, and what<br />
makes us money!<br />
Let the good times roll!<br />
TECHNOCRITTERS<br />
First up on our safari of the <strong>Matrix</strong> are technocritters.<br />
Those adorable little Emergent species look<br />
just like your average animal but devour data like<br />
a deadly datavirus, or they make your virtual life<br />
miserable for no apparent reason. As I said, they’re<br />
everywhere, but I’ll highlight the exciting ones and<br />
let Grandpa G drop a note here and there, always<br />
preceded with a big G, so no one confuses my hip<br />
techno-savvy with his old-world jungle jabbering.<br />
G: Thank you. Important to note here is that<br />
we have yet to record a member of every species,<br />
but based on current data and Emergence rates,<br />
the technosapience phenomenon will continue<br />
to increase, just as it has among metahumans.<br />
Also, much like those same metahumans, the<br />
fields of magic and Resonance do not mix. We<br />
have yet to locate an Emergent paranormal species,<br />
but we continue our search for what would<br />
be an extraordinary find.<br />
> I’ll just say this here at the start. Rumors are rampant that<br />
the entire goal of technocritter research is to locate an<br />
Emergent paracritter or find a way to develop Emergent<br />
abilities in a normal paracritter.<br />
> Beaker<br />
> I know full well the research funding for this entire<br />
G-Nome/Tech-splorer effort is being put up by Hestaby. I<br />
don’t know her mind, but I can imagine this project has<br />
more to do with expanding her support base than actually<br />
developing an understanding of these new creatures.<br />
> Frosty<br />
Much like good ol’ Glitch said in his initial evaluation,<br />
most of these Emergent critters seem generally<br />
similar across broad phylogenic groups. Individual<br />
variations exist here and there but it has<br />
not been found in our studies that species vary on<br />
an individual basis or that major variances occur<br />
within any of our selected criteria.<br />
Kyle Jones (Order #16164256)<br />
164 THE CORE OF CONSCIOUSNESS >>
The names listed below are a subspecies taxonomic<br />
addition that is used to indicate Resonance<br />
sensitivity and control. Example: Ursus<br />
Arctos Yogi is an emergent Brown Bear (in case<br />
any of you cared to be educated on the science<br />
side). If no one has managed to create a witty<br />
subspecies name, or hasn’t named it after themselves<br />
or their pet cat, the Emergent subspecies<br />
is denoted with the technicus nomenclature. No,<br />
no one has been so bold as to tag metahumans<br />
with that, but that’s just because the scientific<br />
community has gone soft and doesn’t want to<br />
risk being overruled by some Corp Court bigwig<br />
with a hard-on for getting things named after<br />
them.<br />
> Guess we know G-Nome’s soft spot.<br />
> Clockwork<br />
YOGI<br />
The ursines, or bears to the common folk, have<br />
been tagged with the adorable Yogi name, in reference<br />
to some ancient cartoon or campground<br />
or some such garbage. The original Yogi apparently<br />
had an insatiable appetite for “pic-a-nic”<br />
baskets, which observers (in this case G-Nome)<br />
translated into the Emergent bears’ insatiable<br />
need to go after data and personas. This means<br />
the yogis are attracted to metahumanity in ways<br />
that don’t balance well with their size and animal<br />
instincts.<br />
Those“Do Not Feed The Bears” signs are easy<br />
enough to obey when they come looking for<br />
snacks to be tossed at them, but when they approach<br />
looking to devour your nav data, or contacts,<br />
or that special file you hide as “Old Text<br />
Files,” you don’t get a lot of choice unless you’re<br />
running with some serious firewall.<br />
That attraction also draws them toward labs<br />
and facilities buried back in the wilds for secrecy,<br />
but the yogis can sniff them out like a deer carcass.<br />
They roam the periphery, sometimes getting<br />
enough little nibbles of data from straggling<br />
files and commlinks, other times pushing boundaries<br />
and testing security. Usually, after the first<br />
encounter, the security teams learn to shut down<br />
their wireless, but stupid is more common than<br />
smart in that field, so yogis can usually get two or<br />
three meals out of a sec detail before they realize<br />
what’s going on. They often get a little meat in<br />
the deal too, when the guard decides to try to<br />
“unjam” his gun, not realizing it’s a brick with no<br />
operating system because the yogi ate it, right<br />
before it ate him. This obviously affects us when<br />
we work a site that has a yogi about, by accident,<br />
but several of these facilities have a series of commlinks<br />
along the perimeter where they upload<br />
data to lure the yogis and move them around like<br />
guards walking the perimeter. When they get full,<br />
they either wander off, sit down and do nothing,<br />
or head out to feed their biological needs. They<br />
aren’t easy to control.<br />
G: The yogi is a high-value target for bounty<br />
hunters, but only live specimens earn the reward.<br />
No way to tell a regular bear from a yogi when<br />
they’re dead. A standard and smart yogi hunt is<br />
like a step back in time. Hunters use blowguns,<br />
air-powered tranq guns with zero electronics,<br />
and even nets to try to snag these big beasts.<br />
Once they nab a target, the hunters have to keep<br />
them tranqed or have a sizable faraday cage, or<br />
else they risk having their stuff bricked by a napping<br />
bear.<br />
> Faraday cages do a decent job to keep these things in<br />
check while they’re being transported, but from what I<br />
hear, it makes them quite violent. Getting blocked from<br />
the <strong>Matrix</strong> angers them something fierce. Issues come<br />
up the moment they open the cage or the field gets<br />
broken. The yogi will go nuts.<br />
> Stone<br />
KILL CODE Al’s on the Bayou is located about a kilometer from an<br />
MCT research facility in south Florida. They have some of<br />
the best gator tail and gator meat dishes in the area, and<br />
166 THE CORE OF CONSCIOUSNESS >><br />
Kyle Jones (Order #16164256)
KILL CODE 2XL<br />
B A R S W L I C ESS EDG RES<br />
8 5 4 9 1 1 2 2 6 3 6<br />
Initiative 6 + 1D6<br />
Movement x2/x6/+4<br />
Condition 14/9<br />
Monitor<br />
Limits Physical 10, Mental 2, Social 4<br />
Armor 6<br />
Physical Skills Perception 4, Sneaking 4, Tracking 4, Unarmed<br />
Combat 4<br />
<strong>Matrix</strong> Skills Computer 4, Cybercombat 8, Electronic Warfare<br />
4, Hacking 5, Software 8<br />
Complex Forms Diffusion of Firewall, Infusion of Attack,<br />
Puppeteer, Resonance Spike<br />
Powers Armor (6), AR-Parallelism, Blend, Enhanced<br />
Senses (Smell), Natural Weapon [Bite, DV (STR+2)<br />
P, AP –2], Resonance Feed, Toughness (2)<br />
TESTUDINES<br />
Trying to uncover a technicus testudine is quite<br />
the shell game. As punny and terrible as that<br />
sounds, it’s actually not a joke. The technicus variant<br />
among every testudine species we managed<br />
to uncover had a similar perfection to the pattern<br />
of their shell. Sections were perfectly sized, and<br />
the patterns within each shell section, once analyzed,<br />
were fractals. The patterns are not easily<br />
identified by simple observation because the repeated<br />
pattern is often disrupted by scars or dirt.<br />
Similar to pachyderms, the testudines have a<br />
protective rather than destructive nature when<br />
it comes to data and personas. The difference<br />
comes in the apparent psychology behind the<br />
action. Testudines tend to gather and hoard their<br />
acquisitions, often creating a virtual stockpile<br />
within the <strong>Matrix</strong>. The stockpile is held within a<br />
self-made host. This is the single most amazing<br />
thing about the testudine technicus group. As a<br />
whole they have the ability to create a small host,<br />
usually tucked away near a larger corporate host<br />
and siphoning off a small amount of processing<br />
power. The hosts are well hidden in the clutter of<br />
whatever <strong>Matrix</strong> traffic or detritus is in the area.<br />
Sometimes, a particularly sly technicus testudine<br />
will manage to hide its host within another host,<br />
like a tumor, or even drop their data well into the<br />
Foundation.<br />
Turtles and their kin are historically well-known<br />
for their slowness, and that stereotype seems to<br />
carry over into the <strong>Matrix</strong>. They are remarkably<br />
slow to act, but they are relentless in their longterm<br />
operations, often working to gather or access<br />
data at a pace that can’t be detected without<br />
complex algorithms or extended observation.<br />
This makes their hosts a great place to locate more<br />
broad-based paydata or older corp info for a prospective<br />
Mr. Johnson, but it also fills their little data<br />
nooks with bits and pieces of all sorts of other files,<br />
meaning you may go to snag a file for Mr. Johnson,<br />
only to find that a portion of the data is now missing,<br />
because a nearby technicus testudine has been<br />
nibbling away at it.<br />
G: It is not outside the realm of possibility for a<br />
skilled wrangler to offer an e-turtle (I like that better)<br />
a place to hang and then occasionally pop in<br />
and sift through the data they’ve siphoned off of<br />
local sources. Moving around from place to place<br />
with the little guy can yield a lot of random paydata.<br />
> Plus, most sheeple find some weirdo with a pet turtle to<br />
be odd. Odd enough that they leave you alone.<br />
> Mika<br />
> Personal experience?<br />
> Ma’fan<br />
> We all have a youth where we often leave behind all sorts<br />
of friends. Tank will forever hold a piece of my heart. He<br />
protected me from many an unpleasantry.<br />
> Mika<br />
B A R S W L I C ESS EDG RES<br />
4 2 1 2 3 2 2 2 6 4 6<br />
Initiative 3 + 1D6<br />
Movement 2/4/+0.5 (4/8/+1 Swimming)<br />
Condition 12/10<br />
Monitor<br />
Limits Physical 3, Mental 3, Social 5<br />
Armor 8<br />
Physical Skills Diving 3, Perception 4, Swimming 4, Unarmed<br />
Combat 3<br />
<strong>Matrix</strong> Skills Computer 3, Cybercombat 4, Electronic Warfare<br />
4, Hacking 4, Software 5<br />
Complex Forms Diffusion of Attack, Diffusion of Data Processing,<br />
Infusion of Firewall, Pulse Storm, Resonance<br />
Hosting, Resonance Spike<br />
Powers AR-Parallelism, Blend, Munge, Resonance Feed,<br />
Toughness (2)<br />
KILL CODE >
KILL CODE Interesting. I’ve heard of places like that in the slums of<br />
New Delhi, also associated with the local monkeys that<br />
roam the region. I imagine it’s eerie in the the jungle, but<br />
imagine one of these voids in a massive urban sprawl<br />
that is usually crawling with people and things, and<br />
suddenly you have a space the size of a football stadium<br />
where objects and buildings have been smashed and<br />
dismantled, but the whole place is wall-to-wall AROs.<br />
> Traveler Jones<br />
GEF<br />
Never underestimate the amount of information<br />
one person can have on a single subject.<br />
That’s the lesson I took from trying to argue with<br />
G-Nome about why we should lump the gef, the<br />
technicus mongooses we discovered, in with the<br />
iPodos. Not only did he school me on the vast differences<br />
between the two in classification, but he<br />
also went on to actually pull up virtual skeletons<br />
to point out differences in structures, followed<br />
by a long diatribe on the behavioral differences,<br />
and finally a titillating dissertation on cultural<br />
and geographical variations between the two,<br />
including the strange legend that gave us the<br />
name “gef.” At some point I either have to learn<br />
to shut up and not open my mouth on topics I<br />
don’t know about, or pick up a book beforehand<br />
and maybe show him I’m trying. That’s my relatively<br />
brief way of pointing out to the readers that<br />
they’re different.<br />
From a <strong>Matrix</strong> activity standpoint, they’re drastically<br />
different, but their efforts in one reality often<br />
mirror their efforts in the other. The classic battle<br />
of mongoose and cobra plays out in the <strong>Matrix</strong><br />
as gef vs. ahi. So much so that fight promoters in<br />
the Indian Union pay big money for the capture of<br />
both ahi and gef, so that they can put on a crazy<br />
fight that spans both the <strong>Matrix</strong> and meatworld.<br />
Gef are fighters, and their Resonance talents reflect<br />
that in a big way. They focus on locating and<br />
destroying their prey.<br />
G: The gef are far more violent than their mundane<br />
kin. Their access to the <strong>Matrix</strong> seems to<br />
make them hyper-aggressive, and even the smallest<br />
activity can be seen as a threat. They’re known<br />
for attacking prey and targets that are significant-<br />
KILL CODE ><br />
Kyle Jones (Order #16164256)
KILL CODE That’s funny. I looked up that movie—oh ghost, it’s terribly<br />
wonderful—and I know a kid named Dar who has a pair<br />
of pet “ferrets” named Podo and Kodo. The quotes are<br />
because Podo and Kodo are actually greater grison (I<br />
looked it up). He claims to have picked them up in Cancun<br />
on a vacation, and the three of them hacked the cruise<br />
ship, customs, and the airline to get them back to the<br />
states. They’re both technicus and he’s a technomancer.<br />
They live near St. Louis, and he’s developing quite the rep<br />
for having the right data or knowing how to get the right<br />
data, likely with the help of his little friends.<br />
> /dev/grrl<br />
> Can’t imagine what the infamous honey badger does with<br />
tech and data it gets its mental claws on. Probably need<br />
some form of repair program to gather any useful data<br />
that one of those things might have gathered.<br />
> Slamm-0!<br />
B A R S W L I C ESS EDG RES<br />
1 2 2 1 4 1 2 3 6 5 6<br />
Initiative 4 + 1D6<br />
Movement x2/x6/+4<br />
Condition 8/10<br />
Monitor<br />
Limits Physical 2, Mental 3, Social 6<br />
Armor 0<br />
Physical Skills Gymnastics 3, Perception 3, Sneaking 3, Tracking<br />
4, Unarmed Combat 3<br />
<strong>Matrix</strong> Skills Computer 5, Cybercombat 3, Electronic Warfare<br />
5, Hacking 6, Software 5<br />
Complex Forms Diffusion of Firewall, Diffusion of Attack, Infusion of<br />
Sleaze, Pulse Storm, Puppeteer, Resonance Spike<br />
Powers AR-Parallelism, Blend, Gremlins, Holographic<br />
Concealment, Munge, Natural Weapon [Bite: DV<br />
(STR+1)P, AP —, 1 Reach], Resonance Feed, Tunnel<br />
Weaknesses Fragile 1<br />
Note<br />
The physical stats given are specifically for<br />
ferrets, but they generally reflect this group. Add<br />
1 to all physical stats for otters and badgers; add 2<br />
for wolverines.<br />
ENERGIZER<br />
There are plenty of famous bunnies and rabbits for<br />
these to get named after, but Energizer was our<br />
hands-down favorite. First observation we made<br />
was the sudden jump in processing power that<br />
any system gets when accessed by an Energizer.<br />
It’s universal in its effect, and whether or not this is<br />
beneficial to the creature, it happens. The processing<br />
boost is usually quite beneficial as the Energizers<br />
usually gain access to a host or device and then<br />
immediately begin replicating files. The process has<br />
a twofold gain, the flood of activity masks the presence<br />
of the critter in the <strong>Matrix</strong> and offers a massive<br />
abundance of data to snatch, snag, and snack<br />
on. The data copies usually flood the memory of<br />
the device in question or throw a host into a sea of<br />
file copies to muddy up all the other activities on it.<br />
KILL CODE Thanks to a still-existent German subculture and abundant<br />
rabbits, you can get some of the best hasenpfeffer in the<br />
world in the CZ. They have a lot of local variations, but<br />
several cooks in the area keep a solid traditional spin on<br />
it. It is amazing.<br />
> Traveler Jones<br />
B A R S W L I C ESS EDG RES<br />
1 5 4 1 2 1 3 3 6 8 6<br />
Initiative 7 + 2D6<br />
Movement 5/30/+2<br />
Condition 5/9<br />
Monitor<br />
Limits Physical 3, Mental 3, Social 5<br />
Armor 0<br />
Physical Skills Gymnastics 4, Perception 6 (Hearing +2),<br />
Running 8, Unarmed Combat 2<br />
<strong>Matrix</strong> Skills Computer 4, Cybercombat 2, Electronic Warfare<br />
5, Hacking 5, Software 5<br />
Complex Forms Diffusion of Attack, Infusion of Data Processing,<br />
Pulse Storm, Resonance Spike, Resonance Veil,<br />
Static Bomb<br />
Powers AR-Parallelism, Blend, Enhanced Senses<br />
(Wideband Hearing, Low-Light), Holographic<br />
Concealment, Resonance Feed<br />
Weaknesses Fragile (4)<br />
G33K0S<br />
These are the most obnoxious little bastards on the<br />
planet, and I’m going to jam the name I’m giving<br />
them down everyone’s throat because every little<br />
one of these things should be geeked! G-Nome<br />
had issues with the primates; I have major issues<br />
with these little gear-trashing monsters. I have no<br />
problem with a technocritter that wants to start<br />
slinging code to trash my gear. I can defend against<br />
that. Problem is, these little bastards sneak in when<br />
you aren’t using your gear, or even sneak onto you<br />
when you are, and then they overheat your stuff<br />
to give them some warmth. This isn’t acceptable.<br />
Come at me on the <strong>Matrix</strong>, but don’t be creeping<br />
into my pocket or my gear bag and making my ’link<br />
get sizzling hot because you have serious temperature<br />
issues. If you didn’t want to be cold-blooded,<br />
you shouldn’t have evolved that way. I know that’s<br />
not how it works, but I’m pissed.<br />
G: Had to get one of these away from the edit<br />
program before he fried a circuit in his own brain<br />
instead of the antique (but fully functional) Atari<br />
2600 that got melted down by a lizard we picked<br />
up in Florida that climbed into his luggage. The little<br />
guy sensed the early-generation wireless connector<br />
and hooked itself up, using its ability to offer a<br />
small power boost to light it up long enough for reprogramming.<br />
I don’t know why so many of these<br />
critters can interact with old tech, but research is<br />
underway.<br />
One already apparent fact about the g33k0s<br />
is that they are expanding their habitat. They are<br />
shifting to places lizards aren’t normally present<br />
because of their ability to overheat devices and use<br />
that heat for a nest and eggs. Major structures in cities<br />
all over the northern and southern hemispheres<br />
are getting lizards. They hitch a ride with travelers,<br />
cooking some of their equipment for warmth, and<br />
eventually find a place to settle and then expand<br />
from there. They’re a primarily indoor problem in<br />
most cooler cities, but summer months allow for<br />
extensive expansion and invasion. They aren’t an<br />
apex-level species, but they still rock the local ecosystem<br />
boat. They also breed true at an astonishing<br />
rate, varying from seventy-five percent to one hundred<br />
percent in broods that we have studied. I have<br />
almost all of the data correlated, and it appears the<br />
technicus trait in most of the small lizard species relates<br />
to egg temperature during incubation, similar<br />
to crocodilian gender being determined through<br />
temperature-dependent sex determination, or TSD.<br />
> I’ve known about these things for awhile. I’ve spent a bit<br />
of time in building vents, and these little lizards love to use<br />
them to move around buildings and look for their next bit<br />
of gear. I actually caught a few of them and bred them.<br />
172 THE CORE OF CONSCIOUSNESS >><br />
Kyle Jones (Order #16164256)
KILL CODE Mika<br />
> Caught?<br />
> Ma’fan<br />
> Ever keeping me a little honest, eh Ma’fan? Sure, they got<br />
into my gear. Lost a burner ’link (haha) but gained a great<br />
new tool.<br />
> Mika<br />
B A R S W L I C ESS EDG RES<br />
1 4 4 1 2 1 3 2 6 2 6<br />
Initiative 7 + 1D6<br />
Movement 2/8/+0.5<br />
Condition 3/9<br />
Monitor<br />
Limits Physical 3, Mental 3, Social 5<br />
Armor 1<br />
Physical Skills Gymnastics 3, Perception 4, Running 2, Unarmed<br />
Combat 2<br />
<strong>Matrix</strong> Skills Computer 3, Cybercombat 3, Electronic Warfare<br />
5, Hacking 4, Software 4<br />
Complex Forms Diffusion of Attack, Diffusion of Firewall, Infusion<br />
of Sleaze, Pulse Storm, Puppeteer, Resonance<br />
Spike<br />
Powers AR-Parallelism, Blend, Cozenge, Holographic<br />
Concealment, Resonance Feed<br />
Weaknesses Fragile (6)<br />
RYBBYTS<br />
Yup, it’s time to talk frogs and toads that can, for<br />
some ghost-only-knows-why reason, connect to<br />
the <strong>Matrix</strong>. I’m not sure why I feel like this is the<br />
one category of animal that just shouldn’t have a<br />
place in the <strong>Matrix</strong>, but I do. With said belief, I put<br />
a lot of effort into ignoring any and all value these<br />
brought to the table, and I might have actually<br />
put some effort into sabotaging some research<br />
stations G-Nome and I set up.<br />
Does that really sound like me? If you don’t<br />
know me, it doesn’t, but that’s what G-Nome saw<br />
when he checked out the footage from the stations<br />
we set up near every ghost-damned monitoring<br />
station for any kind of frog or toad. From the depths<br />
of the Amazonian jungle to the deserts of the PCC,<br />
every single piece of data featured edited footage,<br />
usually compiled from additional files located on<br />
our own commlinks. The rybbyts hack in, snag bits<br />
of video and audio footage, and then splice it into<br />
the feed watching them. One particularly creative<br />
one spliced in footage of a behemoth (the Awakened<br />
alligator) over itself. That one went viral on the<br />
<strong>Matrix</strong>, but I digress. This particular group likes to<br />
edit things. They change the footage of monitoring<br />
stations they get near—trideos, videos, cameras,<br />
microphones, and anything else short of a sim-feed<br />
(note to self: research sim mods with frog species)<br />
gets tweaked with its own data or data taken from<br />
other nearby feeds. Often, the images make no<br />
sense. They aren’t intelligent, just capable of editing<br />
and hacking, but a loop doesn’t have to be complex<br />
to mess up a security feed. Obviously an option for<br />
the folks reading this!<br />
G: First, stop saying frogs and toads. Toads are<br />
frogs. It’s like saying frogs and more specific frogs.<br />
As a group, frogs live everywhere but the coldest<br />
northern and southern reaches as well as the deep<br />
desert, but that’s their only limitation. They’re in<br />
your local creek, they’re in local pet tanks, and<br />
they’re hopping along the roads, forests, jungles,<br />
deserts, and swamps of the world. The rybbyts<br />
are just as spread out, with an apparently higher<br />
rate of technicus evolution in species with more urban<br />
and suburban contact, but the globalized grid<br />
could very well be increasing Emergence in more<br />
reclusive species.<br />
While I was initially very angry at Tech-splorer,<br />
I have since moved past any errors on her part to<br />
look at this editing ability as a form of camouflage.<br />
No matter what form of vision or audio detection<br />
system you are using, the rybbyts are going to<br />
avoid detection. Sure, you can analyze their presence,<br />
but you can only study this footage in the<br />
way astronomers study black holes by how they<br />
affect what is around them, rather than seeing<br />
the black hole itself. This meant I had to push my<br />
normal natural research habits and capture a few<br />
Emergent species to watch in captivity. Their editing<br />
can affect anything they can gain access to,<br />
and they try to access everything.<br />
While small anomalies are usually common<br />
with individuals among a group of technicus species,<br />
the rybbyts pose an interesting divide between<br />
the various poisonous and non-poisonous<br />
member species, with poisonous variants actually<br />
possessing an aggressive nature. This is strange as<br />
the species themselves are not normally aggressive,<br />
they simply possess an aposematic coloring<br />
system as a defense, not as an invitation to a<br />
fight. This interesting phenomenon among these<br />
poisonous frogs offers a greater ability to actively<br />
KILL CODE I didn’t have a biologist or anything of the sort, so I<br />
didn’t perform research and can’t be sure, but I am<br />
nearly positive two of my squads got tapped by these<br />
little bastards during ops in Amazonia. Edits were found<br />
in their footage, often with strange or non-sensical<br />
changes, and quite a few pieces of tech got bricked by<br />
a code hit that our tech team later compared to a <strong>Matrix</strong><br />
punji trap. A bunch of little defense holes were created,<br />
and a bunch of feces and infectious drek-code was left<br />
behind.<br />
> Picador<br />
> If you’ve got cybersenses, whether eyes and ears or just<br />
eyes, you can use a small collection of rybbyts to give<br />
you quite the trip. It doesn’t have the otherworldliness<br />
of drug-induced hallucinations, but it still gives you the<br />
whole “I’m seeing things” sensation. There’s several<br />
rumors of a PCC training regimen used for the PhyCy<br />
Ops guys. Once you get visual or auditory systems<br />
replaced, you have to go through training to operate<br />
blind or confused because the systems can get hacked.<br />
To offer the most whacked-out drek possible, the PCC<br />
supposedly uses rybbyts.<br />
> Stone<br />
B A R S W L I C ESS EDG RES<br />
2 3 2 1 2 1 2 2 6 3 6<br />
Initiative 5 + 1D6<br />
Movement 2/10/+1<br />
Condition 4/9<br />
Monitor<br />
Limits Physical 3, Mental 3, Social 5<br />
Armor 0<br />
Physical Skills Diving 2, Perception 4, Swimming 4, Unarmed<br />
Combat 2<br />
<strong>Matrix</strong> Skills Computer 3, Cybercombat 4, Electronic Warfare<br />
4, Hacking 4, Software 5<br />
Complex Forms Infusion of Attack, Editor, Pulse Storm,<br />
Puppeteer, Resonance Spike, Static Veil<br />
Powers AR-Parallelism, Blend, Natural Weapon (Tongue:<br />
DV [STR)P, AP —], Resonance Feed, Venomous<br />
<strong>Code</strong><br />
Weaknesses Fragile (5)<br />
TECHWORMS<br />
I gained a greater understanding of how hard<br />
it is for scientists to determine the nature and<br />
origin of the technomancer connection after<br />
our research into the Emergent worms we call<br />
techworms. Small, simple brains, but they can<br />
still tear up a firewall and completely obliterate<br />
it with enough of them working together.<br />
They infect devices with program worms (aptly<br />
named) and viruses intended not to just create<br />
those aforementioned holes in the firewall but<br />
to decrease the overall productivity of the system<br />
and sap some of its power for themselves.<br />
We checked out common earthworms first but<br />
eventually expanded our studies to parasitic<br />
worms, which can make life exceedingly difficult<br />
for anyone using or near tech once they get settled<br />
inside. We even went to Africa, where I got<br />
introduced to the giant African earthworm. The<br />
emergent specimen we found was only 1.4 meters,<br />
but G-Nome found us several larger specimens,<br />
including a 4.8-meter monstrosity that is<br />
still giving me nightmares.<br />
G: I personally wanted to bring that beautiful<br />
beast home with me to help sort out my garden<br />
soil, but since our return from Africa was already<br />
costly enough, I couldn’t justify the funds to haul<br />
it home. Had I known how scarred Tech-splorer<br />
was, I would have ditched the case of Zulu<br />
hooch. On a serious note, the worms of the<br />
world are obviously touched by whatever evolution<br />
created technomancers. Our evidence<br />
ranged from earthworms to parasitic intestinal<br />
and subcutaneous worms, but efforts are in the<br />
works to seek marine techworms for study. Their<br />
distribution isn’t as friendly for study, though,<br />
especially with the uptick of leviathans asking<br />
questions of every metahuman under the surface.<br />
While we focus here on the detrimental effects<br />
connected to the <strong>Matrix</strong>, don’t forget that<br />
most of these parasitic worms bring with them<br />
plenty of other issues, some life-threatening.<br />
Getting one that happens to be able to mess with<br />
your tech could be a gift of ghost in disguise, because<br />
I know most people are far more likely to<br />
notice when their commlink keeps shorting out<br />
than when they are having odd cramps and eating<br />
for two but losing weight.<br />
174 THE CORE OF CONSCIOUSNESS >><br />
Kyle Jones (Order #16164256)
KILL CODE Qet is a data broker in the Andes. He accepts info via sat-link,<br />
then loads it into one of his dot-camel alpacas or llamas—I<br />
don’t know or care to know the difference. The heard roams<br />
mostly free in the mountains near his base. He has tags on<br />
all of them and knows which ones are storing what. It’s a<br />
sweet setup, and he keeps the list of what’s stored where in<br />
a ledger written in Olmec for protection<br />
> The Smiling Bandit<br />
> I’ve used Qamil, who operates out of Morocco, as a<br />
datavault before. He uses the dot-camel method, sending<br />
them out with his nomadic security team.<br />
> Ma’fan<br />
B A R S W L I C ESS EDG RES<br />
10 3 3 8 3 1 3 4 6 3 6<br />
Initiative 6 + 1D6<br />
Movement 9/30/+6<br />
Condition 17/10<br />
Monitor<br />
Limits Physical 10, Mental 3, Social 6<br />
Armor 4<br />
Physical Skills Gymnastics 3, Perception 3, Running 6, Unarmed<br />
Combat 3<br />
<strong>Matrix</strong> Skills Computer 4, Cybercombat 4, Electronic Warfare<br />
6, Hacking 6, Software 6<br />
Complex Forms Diffusion of Attack, Diffusion of Data Processing,<br />
Infusion of Firewall, Pulse Storm, Puppeteer,<br />
Resonance Channel, Resonance Hosting,<br />
Resonance Spike<br />
Powers Armor (4), AR-Parallelism, Blend, Gremlins,<br />
Natural Weapon (Hoof: DV (STR)P, AP —, +1<br />
Reach), Resonance Feed, Toughness (4)<br />
E-FISH<br />
As anyone who has ever done any diving, fishing,<br />
or study of marine life knows, fish come with<br />
a level of variety matched only by bugs. They<br />
are crazy and abundant, but as most fisherman<br />
know, they tend to congregate near ample food<br />
supplies. The e-fish tend to be most common in<br />
freshwater and coastal species as they’re closer<br />
to civilization, though several have emerged<br />
around aquacologies and other aquatic habitats<br />
with intense <strong>Matrix</strong> infrastructures for the e-fish<br />
to interact with, though spotting the one among<br />
the many is nearly fragging impossible. They tend<br />
to move in numbers and eat tiny bits of data, corrupting<br />
it in small ways rather than destroying it<br />
completely.<br />
G: The vast array of species and the quantity of<br />
fish in the waters of this vast planet made the study<br />
KILL CODE This is horrifying! Kane, how do you live out there?<br />
> Slamm-0!<br />
> Have you met /dev/? I’m far more worried for the ravager<br />
that gets in range of her deck. Stunned sharks don’t swim<br />
well, and as most folks know, an immobile shark is not<br />
long for this world.<br />
> Kane<br />
> I actually managed to snag one of those sweet hunter<br />
decks. I had it modded for underwater use, and we have<br />
cages on several ships to drop me in the water with the<br />
big fishes. I got no problem going toe to fin with a ravager.<br />
Thing that usually makes me angry is that the other ones<br />
usually get the meal. I love shark steaks.<br />
> /dev/grrl<br />
176 THE CORE OF CONSCIOUSNESS >><br />
Kyle Jones (Order #16164256)
KILL CODE
KILL CODE I know at least one exec over at Gaeatronics who had a<br />
team snatch several of these. Whenever a plant with some<br />
reputation issues is about to get an audit, they usually<br />
have some kind of sudden data corruption, blamed on a<br />
protosapient AI. Total coincidence, I’m sure.<br />
> Glitch<br />
W L I C EDG DEPTH<br />
20 4 4 30 4 2<br />
Core Condition Monitor 10<br />
<strong>Matrix</strong> Skills Computer 3, Cybercombat 5,<br />
Electronic Warfare 4, Hacking 4<br />
Qualities<br />
Inherent Program (Decryption),<br />
Munge, Real World Naïveté<br />
Programs<br />
Armor, Edit, Fork, Hammer,<br />
Mugger, Shredder<br />
SENSE EATERS<br />
The invention of cyberware has, over the course<br />
of the last several generations, virtually eradicated<br />
blindness and deafness in the modern world.<br />
There are occasionally cases of individuals who<br />
cannot or prefer not to have cyberware installed<br />
and remain without two of their primary senses,<br />
but most people with those sensory limitations<br />
get them remedied. This makes the attack of a<br />
178 THE CORE OF CONSCIOUSNESS >><br />
Kyle Jones (Order #16164256)
KILL CODE
KILL CODE Thanks G. If you didn’t say something, I would have.<br />
Evo accepts all kinds and they have one of the largest<br />
Deaf populations in the world. If you ever want a true<br />
and honest opinion about something, ask one of them.<br />
Which means there is a group of people with more innate<br />
resistance to a sense eater attack.<br />
> Plan 9<br />
> Can sense eaters be trained? Matt Wrath has a friend who<br />
wants to know.<br />
> Matt Wrath<br />
> Since they are relatively primitive creatures, quite<br />
possibly, but I don’t know any protosapient trainers.<br />
> Netcat<br />
> You don’t need to train them. Just box them up and then<br />
slip the box onto a host or near devices you want them to<br />
wreak havoc on.<br />
> Clockwork<br />
W L I C EDG DEPTH<br />
3 4 7 5 3 5<br />
Core Condition Monitor 10<br />
<strong>Matrix</strong> Skills Computer 4, Cybercombat 4,<br />
Electronic Warfare 6, Hacking 6<br />
Qualities<br />
Inherent Program (Decryption),<br />
Munge, Real World Naïveté<br />
Programs<br />
Armor, Cat’s Paw, Edit, Exploit,<br />
Fnord, Fork, Sneak, Stealth<br />
GLITCHES<br />
One thing that helps when you’re hunting technomancers<br />
is regular and consistent focus on your<br />
job. Glean some rumors from the masses, dig a little<br />
deeper to uncover a kernel of truth, and then set<br />
out on a globe-trotting hunt. I’ve learned to value<br />
G-Nome’s expertise with this end of the hunting process.<br />
Even though the <strong>Matrix</strong> is global, no one wants<br />
several thousand kilometers between them and a<br />
target in the modern <strong>Matrix</strong>. Signal degradation is<br />
huge and these things already have some major advantages<br />
on us—this is their turf, we just gain access<br />
through devices. Even if we don’t need one—I can<br />
access the <strong>Matrix</strong> on my own, but I might use a cyberdeck<br />
when going after some of these things, just<br />
to put some protection between them and my brain.<br />
All that said, glitches are slitches that deserve<br />
all the stitches. These damn things focus on bricking<br />
devices that connect to the <strong>Matrix</strong>. If it has a<br />
wireless connection, they are going after it. No big<br />
surprise there, but it’s their style that gets me. They<br />
don’t just slam it with code, they infuse it with errors<br />
until it pretty much bricks itself. The process is<br />
similar to the gradual process of tech getting out of<br />
date. Like the commlink you bought back in 2074<br />
that runs okay, but it’s lost a step or two over the<br />
years. Or the one you bought back in 2070 that<br />
doesn’t even operate with the current system without<br />
a virtual machine between the two allowing<br />
code to be translated. The glitches expedite that<br />
slowdown process until the device just goes dark,<br />
gets stuck on the lock screen, or leaves you with the<br />
perpetual spinning beachball of doom!<br />
All the glitches we have seen—a total of six—<br />
have had different appearances based on the devices<br />
they were trying to slowburn. Each appeared<br />
as an icon for the device, or matched the persona<br />
of the device’s user, but they always appeared<br />
slightly fuzzy at the edges with lines of discoloration<br />
and disruption throughout. The appearance<br />
wasn’t static, and they changed when they moved<br />
between devices. When not attached to a device,<br />
they formed into a single stream of rainbow code<br />
that shot out through the <strong>Matrix</strong> and moved on to<br />
their next target.<br />
> After a bad flight, I did a little digging into the avionics<br />
system on our suborbital. The system was full of damaged<br />
code and operating errors. It also had an appearance like<br />
you described. I think a glitch was slowly damaging the<br />
craft, and I’m glad I got clear when I did.<br />
> Puck<br />
W L I C EDG DEPTH<br />
4 6 4 3 3 6<br />
Core Condition Monitor 10<br />
<strong>Matrix</strong> Skills Computer 6, Cybercombat 6,<br />
Electronic Warfare 5, Hacking 5<br />
Qualities<br />
Corruptor, Easily Exploitable,<br />
Inherent Program (Crash),<br />
Munge, Real World Naïveté<br />
Programs<br />
Armor, Exploit, Fork, Shredder,<br />
Stealth, Tantrum<br />
SIN EATERS<br />
These were my favorites to chase after because of<br />
the amusement I got from watching people get<br />
180 THE CORE OF CONSCIOUSNESS >><br />
Kyle Jones (Order #16164256)
KILL CODE I recommend you send your hacker ahead to scope out<br />
a crossing just like you astrally recon spots with your<br />
spellslingers. If there’s a SIN eater at a crossing, you’d best<br />
to find another route.<br />
> Traveler Jones<br />
W L I C EDG DEPTH<br />
3 4 4 5 3 6<br />
Core Condition Monitor 10<br />
<strong>Matrix</strong> Skills Computer 6, Cybercombat 4,<br />
Electronic Warfare 6, Hacking 6<br />
Qualities<br />
Inherent Program (Edit), Munge,<br />
Real World Naïveté<br />
Programs<br />
Armor, Browse, Decryption,<br />
Exploit, Fork, Stealth, Wrapper<br />
NOISESTORM<br />
This was an odd one. The noisestorm appeared to<br />
have no other purpose than to float around in the<br />
<strong>Matrix</strong> and cover large swaths of <strong>Matrix</strong> terrain<br />
with a massive storm of noise. Every device in the<br />
area is affected—they can cover areas as small as<br />
fifty meters of real space all the way up to fuzzing<br />
up entire grids. Even worse, a few have managed<br />
access to hosts, where they inflict the same phenomenon<br />
in a place that is usually free of most<br />
major noise. Efforts to attack the phenomenon<br />
have had varying results. Most report little damage<br />
to the noisestorm and no effect, but some<br />
reports indicate the noisestorm being chased off.<br />
The most common rumor is an increase in local<br />
effect after the noisestorm is attacked, as if it is<br />
retaliating for the attack.<br />
G: It’s hard to draw any real parallels across<br />
the realms of the <strong>Matrix</strong> and the astral, but<br />
noisestorms definitely appear to be similar in<br />
some ways to manastorms. There is no evidence<br />
to connect them directly, but I see them as parallel<br />
evolutionary paths, like the Tasmanian wolf and its<br />
European equivalent.<br />
W L I C EDG DEPTH<br />
4 2 2 3 2 8<br />
Core Condition Monitor 14<br />
<strong>Matrix</strong> Skills Computer 3, Cybercombat 5,<br />
Electronic Warfare 4, Hacking 4<br />
Qualities<br />
Inherent Program (Decryption),<br />
Munge, Real World Naïveté,<br />
Redundancy, Snooper<br />
Programs<br />
Armor, Encryption, Fork<br />
Notes<br />
Noisestorms travel in groups.<br />
Each one covers a small area and<br />
targets devices and personas in<br />
its vicinity. Destroying one may<br />
clear an area or open it up for<br />
other noisestorms to move over.<br />
XENOSAPIENTS<br />
THE NULL FORMS<br />
Thanks to Puck and his eye-opening view of something<br />
new and dark in the <strong>Matrix</strong>, G-Nome and I got<br />
heavily into looking for these interesting host-stealing<br />
creatures and the strange IC they seem to command.<br />
We thought maybe the IC was actually some<br />
form of generated protosapient. Simple and direct,<br />
but still not just a program. Our efforts landed us<br />
an interesting letter, one that talked all about this<br />
dark <strong>Matrix</strong> fear factory and the creepies it generated.<br />
The IC seems to be little more than a program<br />
kicked out by the Overseers—we’ll talk about them<br />
in a minute—but he named other beings, and we<br />
managed to dig into those as well. G-Nome was<br />
not happy about this, as he felt this was stepping<br />
KILL CODE ><br />
Kyle Jones (Order #16164256)
KILL CODE Had a run-in with a group of these in Atlanta. Had to call in<br />
reinforcements and still barely managed to deal with the<br />
four onsite, when I called in twice that number of friends.<br />
> Slamm-0!<br />
> You have eight friends?! I call bulldrek!<br />
> Bull<br />
W L I C EDG DEPTH<br />
2 7 2 1 3 6<br />
Core Condition Monitor: 11<br />
Limits Physical —, Mental 6, Social 6<br />
<strong>Matrix</strong> Initiative (no device) 6 + 4D6<br />
<strong>Matrix</strong> Initiative (w/device) 3 + Data Processing + 4D6<br />
Skills Computer 2, Cybercombat 8,<br />
Electronic Warfare 3, Hacking 3<br />
Qualities<br />
Bad Rep, Inherent Program<br />
(Hammer), Munge, Real World<br />
Naïveté<br />
Programs<br />
Authority, Armor, Blackout,<br />
Cascade, Cat’s Paw, Decryption,<br />
Fork, Mugger, Tantrum<br />
CLEAR-OUT<br />
The invisible enemy. Clear-Out are stealth masters<br />
and exist to do nothing more than erase data.<br />
Usually traveling in large groups, Clear-Out gain<br />
access to their targets and then proceed to wipe<br />
them clean, erasing everything in their path. We<br />
found initial traces of them as part of data loss<br />
investigations and then did some extremely exciting<br />
(and by that, I mean boring as frag) stakeouts<br />
of places with potential info on the masters<br />
of this little e-cult. They are nearly impossible to<br />
detect, but once we had erasure events in progress,<br />
we jacked our perception enhancement<br />
programs into full gear and managed to spot<br />
the nearly clear humanoid outlines. They looked<br />
something like the Black-Offs, but transparent instead<br />
of black.<br />
W L I C EDG DEPTH<br />
2 3 8 4 4 6<br />
Core Condition Monitor 10<br />
Limits Physical —, Mental 6, Social 6<br />
<strong>Matrix</strong> Initiative (no device) 16 + 4D6<br />
<strong>Matrix</strong> Initiative (w/device) 8 + Data Processing + 4D6<br />
Skills Computer 8, Cybercombat 2,<br />
Electronic Warfare 2, Hacking 6<br />
Qualities<br />
Bad Rep, Inherent Program<br />
(Edit), Low Profile, Munge, Real<br />
World Naïveté<br />
Programs<br />
Armor, Fork, Sneak, Stealth<br />
OVERSEERS<br />
These are the masters of the hosts that get seeded.<br />
They guide their lesser forms and corral the<br />
protosapients that are attracted to their seeded<br />
hosts and the vines. They are powerful foes in<br />
their own hosts and should not be taken lightly.<br />
With those brief statements made, I’ll toss out<br />
an RIP Jiggy. The man brought skills to the party<br />
and helped G-Nome and I check out one of those<br />
vine-infested hosts (a former NeoNET lab host),<br />
but he got too excited and didn’t know when it<br />
was best to run.<br />
Overseers are said to take on a form with some<br />
relation to the host they seed. Unfortunately, I<br />
have only seen one myself, and while it fit that<br />
pattern, any other evidence I have of that pattern<br />
is anecdotal.<br />
KILL CODE ><br />
Kyle Jones (Order #16164256)
KILL CODE I’ve met Grant before. He is also in charge of interviews for<br />
access to Garmonbozia along with hiring assets to delete<br />
rejections when they don’t take it well.<br />
> Netcat<br />
> All that social software is part of that second process.<br />
Plenty of runners put on a smile and nod when they<br />
get refused but then get pissed at the rejection. Grant<br />
tracks their social circle and uses some solid bio-reading<br />
equipment to check the honesty of their acceptance. To<br />
gather the data, a runner team is often hired to get the<br />
subject talking about Garmonbozia, then other members<br />
of the team hit them with biodata readers. Relatively<br />
easy work if you’ve got a decent face, but sometimes<br />
dangerous when you run across someone who really<br />
wants to protect the Garmonbozia secret in order to gain<br />
more favor and maybe earn access.<br />
> Balladeer<br />
> I appreciate the importance of keeping Garmonbozia<br />
a secret, but they popped on and deleted files on<br />
JackPoint. That’s fragging bogus and I’ll continue to<br />
allow users to call it the G-Spot instead of its full name.<br />
“To protect their secret!”<br />
> Bull<br />
> They want to frag with us for helping them? Then forget<br />
about them. Simple.<br />
> Hexatite<br />
> Not everyone on JackPoint is a white hat. We should<br />
remember that.<br />
> Kane<br />
W L I C EDG DEPTH<br />
5 3 4 4 2 4<br />
Core Condition Monitor 12<br />
<strong>Matrix</strong> Skills<br />
Computer 3, Con 6, Cybercombat<br />
4, Electronic Warfare 4, Etiquette<br />
6, Gunnery 2, Hacking 6,<br />
Intimidation 4, Negotiations 5,<br />
Software 3<br />
Qualities<br />
<strong>Code</strong>slinger (Hack on the Fly),<br />
Inherent Program (Decryption),<br />
Linguist, Perceptive,<br />
Redundancy, Trustworthy<br />
Programs<br />
Armor, Cat’s Paw, Edit, Encryption,<br />
Exploit, Fork, Guard, Hammer,<br />
Stealth<br />
HITSEC BURN<br />
Sometimes you gotta call a spade a spade. Hitsec<br />
Burn is a program so far beyond damaged that no<br />
one, not even his tragic inventor, would miss him<br />
if he were gone. Scouring the <strong>Matrix</strong> for info on<br />
this electronic assassin was tough, but everything<br />
I found just painted a blacker and blacker picture.<br />
Hitsec focuses on one thing and one thing only:<br />
eradicating and removing people from the <strong>Matrix</strong>,<br />
usually in a permanent fashion. As he also lacks<br />
any concept of morals or rules for his actions, removing<br />
a single hacker by burning down a building<br />
or crashing a suborbital isn’t out of the question.<br />
I would recommend that if you ever end up on<br />
Hitsec’s list (and finding out that you’re on the list is<br />
not that difficult, which is weird), you call in every<br />
data slicing master you can find and set a trap. It<br />
may not work—Hitsec is sly—but it’s the best option<br />
for getting two desirable results, namely: you survive,<br />
and he doesn’t. This thing needs to be erased.<br />
Operationally, Hitsec has taken jobs all over the<br />
world. Recent operations have jumped across four<br />
continents and fourteen different grids over the span<br />
of only three days. It was an effort to clean up a line of<br />
hackers that had accessed a file from MCT. Whether<br />
this was contracted or personal, I don’t know, though I<br />
lean toward the former with the megacorporate connection.<br />
The attacks covered a variety of styles includ-<br />
KILL CODE Hitsec is a pro. Collateral damage is considered as part<br />
of the way he works. It doesn’t make him any worse than<br />
half of us. In truth, with the kind of exposure and access<br />
Hitsec has managed, he might be a solid replacement<br />
here for Riser. He reminds me a lot of that drekbag,<br />
but that drekbag had a ton to teach the rest of us about<br />
surviving at any cost.<br />
> Balladeer<br />
W L I C EDG DEPTH<br />
6 4 7 5 4 9<br />
Core Condition Monitor 14<br />
<strong>Matrix</strong> Skills<br />
Computer 3, Con 8, Cybercombat<br />
9, Electronic Warfare 4, Gunnery<br />
8, Hacking 8, Intimidation 8, Pilot<br />
Aircraft 5, Pilot Ground Craft 5<br />
Qualities<br />
Inherent Program (Decryption),<br />
Perceptive, Redundancy,<br />
Snooper<br />
Programs<br />
Armor, Biofeedback, Blackout,<br />
Cascade, Cat’s Paw, Decryption,<br />
Edit, Fork, Hammer, Mugger,<br />
Sneak, Stealth, Tantrum, Tarball<br />
DERRICK OWEN<br />
SLATTERY<br />
Denver is doing some goofy stuff, and this guy is<br />
leading the charge. Currently a Denver native, he<br />
is operating at the forefront of collaborative efforts<br />
between Danielle de la Mar, Ghostwalker/Whitebird,<br />
and Erika to install the newest <strong>Matrix</strong> in Denver<br />
as a test city. Ghostwalker’s recent power grab<br />
is offering the white worm a lot of leeway in how<br />
to run his city. Among his efforts is a change in the<br />
<strong>Matrix</strong> that could drastically change the life of hackers.<br />
Derrick is looking to help because he finds the<br />
increased security and limited access style for this<br />
next <strong>Matrix</strong> adjustment a definite improvement in<br />
the lives of <strong>Matrix</strong> denizens. According to some<br />
pieces I listened to, he considers the current open<br />
<strong>Matrix</strong> akin to allowing anyone to walk into your<br />
home, but having locks on drawers or nailed-down<br />
furniture. He wants a <strong>Matrix</strong> that feels more like a<br />
home with a solid lock on the door, where once you<br />
are inside, things don’t need to be locked down—<br />
not because they aren’t valuable, but because anyone<br />
who would want to take them won’t get access.<br />
Now, we all know that hackers will always find<br />
a way, but if access is more limited and direct, they<br />
won’t be offered the full buffet.<br />
Derrick focuses on the control and coordination<br />
aspect of these new systems and has a lot<br />
of big support with Ghostwalker and de la Mar.<br />
Those are big guns in the Sixth World, both carrying<br />
momentum from their successes, rather than<br />
fighting their way back from some loss of face or<br />
loss of standing.<br />
> In the Denver shadows he goes by DOS and runs virtual<br />
meets for runners as a Mr. Johnson looking to sew a little<br />
virtual discord. Rumor is he’s the one who engineered the<br />
animosity between the Nexus and JackPoint by setting up<br />
contract hits. The money behind them was never enough<br />
to get real pros interested, but it managed to drive some<br />
solid wedges between us.<br />
> Ire<br />
> Where’d you get that data?<br />
> Glitch<br />
> I’ve been playing this game a long time and I’ve been<br />
settled in Denver for a minute. I’ve got my finger on the<br />
pulse of the Free Zone at the moment, but it’s beating fast<br />
and change is popping up at every turn. I love it!<br />
> Ire<br />
W L I C EDG DEPTH<br />
6 4 5 8 3 7<br />
Core Condition Monitor 12<br />
<strong>Matrix</strong> Skills<br />
Computer 6, Con 6, Cybercombat<br />
4, Electronic Warfare 4,<br />
Etiquette 6, Gunnery 2, Hacking<br />
4, Intimidation 6, Negotiation 8,<br />
Software 2<br />
Qualities<br />
<strong>Code</strong>slinger (Hack on the Fly),<br />
First Impression, Inherent<br />
Program (Decryption), Linguist,<br />
Perceptive, Redundancy,<br />
Trustworthy<br />
Programs<br />
Armor, Cat’s Paw, Decryption,<br />
Encryption, Exploit, Fnord, Fork,<br />
Guard, Sneak, Stealth<br />
186 THE CORE OF CONSCIOUSNESS >><br />
Kyle Jones (Order #16164256)
KILL CODE<br />
RULES<br />
INDEX<br />
COMPLEX FORMS<br />
Arc Feedback.....................................................94<br />
Bootleg Program...............................................94<br />
Causal Nexus...................................................133<br />
Dissonance Spike............................................134<br />
Force Heuristics...............................................133<br />
Host Emulator....................................................94<br />
Hyperthreading.................................................91<br />
LOTO...................................................................90<br />
Mirrored Persona..............................................95<br />
Overdrive............................................................90<br />
Pinch....................................................................95<br />
Primed Charge...................................................95<br />
Resonance Bind.................................................95<br />
Resonance Cache..............................................95<br />
Search History...................................................95<br />
Sprite Pet.............................................................91<br />
Weaken Data Bomb..........................................96<br />
Weaken Encryption...........................................96<br />
CRITTERS<br />
Ax S. Grant...................................................... 185<br />
Black-off........................................................... 182<br />
Clear-out.......................................................... 183<br />
Crocodilians.................................................... 166<br />
Derrick Owen Slattery................................... 186<br />
Dot-camel.........................................................175<br />
E-fish..................................................................175<br />
Energizer...........................................................171<br />
G33k0s..............................................................172<br />
Gef ................................................................... 169<br />
Glitches............................................................ 180<br />
Hitsec Burn...................................................... 185<br />
iPodo..................................................................170<br />
Migaloo.............................................................177<br />
Noisestorm.......................................................181<br />
Nulls.................................................................. 184<br />
Overseers........................................................ 183<br />
Pachyderms..................................................... 166<br />
Power mungers................................................178<br />
Primates........................................................... 168<br />
Ravagers...........................................................176<br />
Red spread ..................................................... 182<br />
Rovers............................................................... 182<br />
Rybbyts..............................................................173<br />
Sense eaters.....................................................178<br />
Sin eaters..........................................................181<br />
Techworms.......................................................174<br />
Testudines.........................................................167<br />
Un-grey-tful .................................................... 183<br />
Yogi................................................................... 165<br />
ECHOES<br />
Aegis..................................................................101<br />
Draining spike..................................................101<br />
Neural synergy.................................................101<br />
Predictive analytics.........................................101<br />
Resonance resistance.................................... 102<br />
The Van der Waals effect.............................. 102<br />
Will of the Resonance.................................... 102<br />
GEAR<br />
Arrowlink............................................................52<br />
Aztechnology Defender..................................63<br />
Aztechnology Shadow Warrior......................62<br />
Blue Goo IC........................................................68<br />
Booster chips.....................................................59<br />
Booster cloud.....................................................56<br />
KILL CODE >
KILL CODE
®<br />
Street fighting is only chaotic<br />
for amateurs. When you’re a pro,<br />
when you know what you’re doing,<br />
you’re precise. You know what your<br />
opponents might do, and you know ten<br />
different ways to respond. The options<br />
give you strength. They give you power.<br />
They make you dangerous enough that<br />
the smart ones on the street will know<br />
at a glance that they shouldn’ test you.<br />
The dumb ones will suffer.<br />
Street Lethal contains the data,<br />
tools, and options players need to<br />
maximize their characters’ combat<br />
skills. With briefings on the security<br />
techniques of major corporations,<br />
information on major mercenary<br />
groups and their operations, and a<br />
whole truckload of firearms options,<br />
this book has all runners need to make<br />
sure they’re the ones left standing at<br />
the end of a fight.<br />
Street Lethal is for use with<br />
<strong>Shadowrun</strong>, Fifth Edition, though<br />
much of the information on corporate<br />
security and other opponents could<br />
also be used in <strong>Shadowrun</strong>: Anarchy.<br />
FIFTH EDITION<br />
Under License From<br />
www.catalystgamelabs.com<br />
© 2018 The Topps Company, Inc. All rights reserved. <strong>Shadowrun</strong> and <strong>Matrix</strong> are registered<br />
trademarks and/or trademarks of The Topps Company, Inc., in the United States and/or<br />
other countries. Catalyst Game Labs and the Catalyst Game Labs logo are trademarks of<br />
InMediaRes Productions, LLC. Printed in China.<br />
CAT27012<br />
PRECISE<br />
POWER<br />
ADVANCED COMBAT RULES<br />
Street fighting is only chaotic for<br />
amateurs. When you’re a pro, when you<br />
know what you’re doing, you’re precise. You<br />
know what your opponents might do, and<br />
you know ten different ways to respond.<br />
The options give you strength. They give you<br />
power. They make you dangerous enough<br />
that the smart ones on the street will know<br />
at a glance that they shouldn’t test you. The<br />
dumb ones will suffer.<br />
Street Lethal contains the data, tools,<br />
and options players need to maximize<br />
their characters’ combat skills. With<br />
briefings on the security techniques of<br />
major corporations, information on major<br />
mercenary groups and their operations,<br />
and a whole truckload of firearms options,<br />
this book has all runners need to make sure<br />
they’re the ones left standing at the end of<br />
a fight.<br />
Street Lethal is for use with <strong>Shadowrun</strong>,<br />
Fifth Edition, though much of the<br />
information on corporate security and<br />
other opponents could also be used in<br />
<strong>Shadowrun</strong>: Anarchy.<br />
Kyle Jones (Order #16164256)
Kyle Jones (Order #16164256)
Kyle Jones (Order #16164256)
The <strong>Matrix</strong> is unknowable because<br />
it is infinite. There is always one<br />
more corner behind which things can<br />
hide, one more hole where secrets<br />
can be buried. Your job isn’t to know<br />
everything about the <strong>Matrix</strong>—it’s to<br />
know more than the people you are<br />
hunting. Or who are hunting you.<br />
<strong>Kill</strong> <strong>Code</strong> will help give Sixth World<br />
hackers the edge they need to stay<br />
alive and get ahead. From a guide to<br />
<strong>Matrix</strong> basics and operations to more<br />
ways to build ace deckers to dozens<br />
of new options for technomancers,<br />
the book can help everyone who tries<br />
to make their living on the <strong>Matrix</strong>,<br />
providing something to give them<br />
an edge when riding the <strong>Matrix</strong>’s<br />
datastreams. They’ll also learn about<br />
who their opposition might be—and<br />
how they might be attacked. The<br />
<strong>Matrix</strong> is full of kill codes waiting to<br />
be executed. Just as with the Sixth<br />
World’s many firearms, your job is to<br />
make sure they’re pointed in the right<br />
direction when they go off.<br />
<strong>Kill</strong> <strong>Code</strong> is an advanced <strong>Matrix</strong><br />
sourcebook for use with <strong>Shadowrun</strong>,<br />
Fifth Edition.<br />
FIFTH EDITION<br />
Under License From<br />
®<br />
www.catalystgamelabs.com<br />
© 2018 The Topps Company, Inc. All rights reserved. <strong>Shadowrun</strong> and <strong>Matrix</strong> are registered<br />
trademarks and/or trademarks of The Topps Company, Inc., in the United States and/or<br />
other countries. Catalyst Game Labs and the Catalyst Game Labs logo are trademarks of<br />
InMediaRes Productions, LLC. Printed in China.<br />
Kyle Jones (Order #16164256)